Cyber Security Regulations and Techniques
11 Questions
3 Views

Cyber Security Regulations and Techniques

Created by
@SparklingNebula

Questions and Answers

Which of the following regulations is mostly violated due to the major cyber security breach?

  • ISO 2002
  • HIPPA/PHI (correct)
  • PCI DSS
  • PII
  • Which of the following advanced operators would allow a penetration tester to restrict the search to the organization's web domain?

  • [location:]
  • [site:] (correct)
  • [allinurl:]
  • [link:]
  • Which Google advanced search operator helps in gathering information about websites that are similar to a specified target URL?

  • [inurl:]
  • [site:]
  • [related:] (correct)
  • [info:]
  • Which tool did Bob employ to gather information about the IoT device he accessed?

    <p>FCC ID search</p> Signup and view all the answers

    Which tool was employed by Lewis to gather information about IoT devices connected to a network?

    <p>Censys</p> Signup and view all the answers

    The time a hacker spends performing research to locate information about a company is known as?

    <p>Reconnaissance</p> Signup and view all the answers

    Which footprinting technique did Juliet use to check the authenticity of images?

    <p>Reverse image search</p> Signup and view all the answers

    What is the framework used by James to conduct footprinting and reconnaissance activities?

    <p>OSINT framework</p> Signup and view all the answers

    What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?

    <p>The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.</p> Signup and view all the answers

    Identify the NetBIOS code used for obtaining the messenger service running for the logged-in user.

    <p>B.</p> Signup and view all the answers

    What would be the purpose of running 'wget 192.168.0.15 -q -S' against a web server?

    <p>Downloading all the contents of the web page locally for further examination.</p> Signup and view all the answers

    Study Notes

    Cyber Security Breaches and Regulations

    • Bob was hired by a medical company following a significant cyber security breach, exposing patient medical records online.
    • Violations include regulatory frameworks designed to protect personal health information: most likely HIPAA/PHI.

    Footprinting and Information Gathering

    • Penetration testers can use advanced Google search operators for footprinting:
      • Site: Restricts search to specific organizational domains.
      • Related: Identifies websites similar to a target URL.
    • Tools for information gathering include:
      • FCC ID search: Used to gather data about IoT devices and their certifications.
      • Censys: An information-gathering tool for network analysis, monitoring open ports, and device exploitation.

    Phishing and Social Engineering

    • Hackers enhance phishing attempts by mimicking internal emails of targeted companies, leveraging familiar branding and high-profile names.
    • The preparatory phase to gather information on a company for phishing is known as Reconnaissance.

    Image Verification Techniques

    • A Reverse Image Search assists researchers in tracking the original sources of images for authenticity verification.

    Ethical Hacking and Frameworks

    • James employs an OSINT framework, utilizing open-source tools for automated reconnaissance and footprinting activities.

    SMTP Enumeration Insights

    • Successful SMTP enumeration can unveil:
      • Valid user confirmations through internal commands like VRFY and EXPN.
      • A list of mail proxy server addresses and user aliases.

    NetBIOS Enumeration

    • During a NetBIOS enumeration, port 139 may reveal resources accessible on a remote system.
    • Specific NetBIOS codes are used for operations, such as identifying the messenger service for the logged-in user.

    Web Server Interaction

    • Running the command wget 192.168.0.15 -q -S typically aims to:
      • Perform content enumeration on the web server to discover hidden files and directories.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers critical aspects of cyber security, including recent breaches, regulations like HIPAA, and techniques for footprinting and information gathering. It also explores phishing and social engineering tactics used by hackers. Test your knowledge of how these elements interact in the realm of cyber security.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser