Ethical Hacking Module 4

Ace your homework & exams now with Quizwiz!

What does the Google Search operator allinurl:keywords do? Displays websites where directory browsing has been enabled Shows results in pages that contain all of listed keywords Shows results in pages that contain the keyword in the title Displays web sites similar to the one listed

Shows results in pages that contain all of listed keywords

Which of the following information sharing policies addresses the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials? An employee social media policy A printed materials policy A company social media policy An internet policy

A printed materials policy

A penetration tester is trying to extract employee information during the reconnaissance phase. What kinds of data is the tester collecting about the employees? Intellectual property, critical business functions, and management hierarchy Contact names, phone numbers, email addresses, fax numbers, and addresses Operating systems, applications, security policies, and network mapping Geographical information, entry control systems, employee routines, and vendor traffic

Contact names, phone numbers, email addresses, fax numbers, and addresses

Which of the following services is most targeted during the reconnaissance phase of a hacking attack? DHCP DoS TLS DNS

DNS

John, a security specialist, conducted a review of the company's website. he discovered that sensitive company information was publicly available. Which of the following information sharing policies did he discover were being violated? An internet policy An employee social media policy A company social media policy A printed materials policy

An internet policy

Whois, Nslookup, and ARIN are all examples of: Google hacking tools Network footprinting tools Internet research tools IoT hacking tools

Network footprinting tools

You have found the IP address of a host to be 172.125.68.30. You want to see what other hosts are available on the network. Which of the following nmap commands would you enter to do a ping sweep? nmap -sM 172.125.68. 1-255 nmap -sU 172.125.68. 1-255 nmap -sS 172.125.68. 1-255 nmap -sn 172.125.68. 1-255

nmap -sn 172.125.68. 1-255

Which of the following is the difference between an ethical hacker and a criminal hacker? A criminal hacker is easily detected, but an ethical hacker isn't An ethical hacker is nice, clean, and polite, but a criminal hacker isn't A criminal hacker is all-knowing, but an ethical hacker isn't An ethical hacker has permission to hack a system, and a criminal hacker doesn't have permission

An ethical hacker has permission to hack a system, and a criminal hacker doesn't have permission

When a penetration tester starts gathering details about employees, vendors, business processes, and physical security, which phase of testing are they in? Scanning Reconnaissance Covering tracks Gaining access

Reconnaissance

MinJu, a penetration tester, is testing a client's security. She notices that every Wednesday, a few employees go to a nearby bar for happy hour. She goes to the bar and starts befriending one of the employees with the intention of learning the employee's personal information. Which information gathering technique is MinJu using? Dumpster diving Social networking Social engineering Web surfing

Social engineering

Julie configures two DNS servers, one internal and one external, with authoritative zones for the corpnet.xyz domain. One DNS server directs external clients to an external server. The other DNS server directs internal clients to an internal server. Which of the following DNS countermeasures is she implementing? Split DNS DNS propagation Proxy server Information sharing policy

Split DNS

Iggy, a penetration tester, is conducting a black box penetration test. He wants to do reconnaissance by gathering information about ownership, IP addresses, domain name, locations, and server types. Which of the following tools would be most helpful? Nslookup beSTORM Whois ARIN

Whois

You are in the reconnaissance phase at the XYZ company. You want to use nmap to scan for open ports and use a parameter to scan the 1,000 most common ports. Which nmap command would you use? nmap -sT xyzcompany.com nmap -sV xyzcompany.com nmap -sS xyzcompany.com nmap -sA xyzcompany.com

nmap -sS xyzcompany.com

Xavier is doing reconnaissance. He is gathering information about a company and its employees by going through their social media content. Xavier is using a tool that pulls information from social media postings that were made using location services. What is the name of this tool? Maltego Google Maps Wayback Machine Echosec

Echosec

Which of the following elements of penetration testing includes the use of web surfing, social engineering, dumpster diving, and social networking? Information types Maintaining access Information gathering techniques Permission and documentation

Information gathering techniques

Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take? Review company websites to see what type of sensitive information is being shared Limit the sharing of critical information is press releases, annual reports, product catalogs, or marketing materials Implement policies that restrict the sharing of sensitive company information on employee's personal social media pages Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups

Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups

What's the name of the open-source forensics tool that can be used to pull information from social media postings and find relationships between companies, people, email addresses, and other information? Google Earth Maltego Wayback Machine Echosec

Maltego


Related study sets

Recursos literarios que comienzan con "I", "J", "L", y "R"

View Set

POPLHLTH 206 L9 - Nutrition in Infancy

View Set

Sports Promotion Quiz 1- Ch 1,2,6

View Set

Romanticism, Victorianism, and Modernism Test

View Set

week 3 Sherpath: Female Reproductive System

View Set

Chapter 48: Caring for Clients with Ostomies

View Set

Real Estate Principles I Unit 1 (exam)

View Set