Untitled Quiz
27 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of these are types of information you are looking to collect about an organization during the information gathering phase? (Select all that apply)

  • Open ports on those target systems (correct)
  • Software used on the target systems (correct)
  • Public IP addresses used by the organization (correct)
  • Email addresses and phone numbers of employees (correct)
  • Target systems that are up and running (correct)
  • Whether software is running in the cloud (correct)
  • What is the term used for discovering information from public data sources available on the Internet?

  • Open Source Internet (OSI)
  • Open Source Network (OSN)
  • Open Source Information (OSI)
  • Open Source Intelligence (OSINT) (correct)
  • Which of these are techniques used for website reconnaissance? (Select all that apply)

  • Robots.txt (correct)
  • Scraping Websites (correct)
  • Manual Inspection of Web Links (correct)
  • Crawling Websites (correct)
  • What is the term used for an information gathering technique in which specific keywords are used to search Google or other search engines?

    <p>Google hacking</p> Signup and view all the answers

    What is the name of a program in Kali Linux used to collect public information from resources such as Google, LinkedIn, Twitter and Bing?

    <p>TheHarvester</p> Signup and view all the answers

    What is the name of a widely used database search used to discover domain name information and IP address information about a company?

    <p>Whois</p> Signup and view all the answers

    Which of these are common tools used for DNS profiling? (Select all that apply)

    <p>dig</p> Signup and view all the answers

    Which of these methods can modify the timing of a Nmap scan?

    <p>-T4</p> Signup and view all the answers

    Which Nmap switch is used to perform a port scan and identify the version of the software running on each port?

    <p>-sV</p> Signup and view all the answers

    Which of these tools are typically used to identify systems that are running on a network? (Select all that apply)

    <p>netdiscover</p> Signup and view all the answers

    Which of these tools are often used to gather information for OSINT? (Select all that apply)

    <p>Whois</p> Signup and view all the answers

    Vulnerability scanning is considered a passive assessment because you are not actively trying to exploit the system.

    <p>True</p> Signup and view all the answers

    What is the term used to describe the process of connecting to and interrogating a network or system to retrieve information about that network or system?

    <p>Enumeration</p> Signup and view all the answers

    Nmap can be used to identify hosts and services, along with identifying the operating system and the version of the software running on those systems?

    <p>True</p> Signup and view all the answers

    Which Nmap switch is often used to perform a basic ping sweep across a network?

    <p>-sP</p> Signup and view all the answers

    A TCP connect scan is considered more stealthy, compared to a SYN scan, as it does not perform a full handshake?

    <p>False</p> Signup and view all the answers

    Which Nmap switch allows you to specify the ports to scan?

    <p>-p</p> Signup and view all the answers

    Which Nmap switch is used to specify a file containing a list of targets to scan?

    <p>-iL</p> Signup and view all the answers

    Which of these are common techniques used to detect and avoid security solutions like WAFs (web application firewalls) and intrusion detection systems?

    <p>Packet crafting</p> Signup and view all the answers

    What is the purpose of a ping sweep within the context of active reconnaissance?

    <p>To identify which systems on a network are actively responding</p> Signup and view all the answers

    What is the primary purpose of using the '-sT' flag within Nmap?

    <p>To establish a full TCP connection to each target port</p> Signup and view all the answers

    Which of these are common steps involved in enumeration? (Select all that apply)

    <p>Enumerating networks</p> Signup and view all the answers

    Which of these are common tools or techniques used to detect load balancers? (Select all that apply)

    <p>Network topology analysis</p> Signup and view all the answers

    What is the purpose of using 'Recon-ng' in the context of OSINT gathering?

    <p>To collect information about a company's network and systems, such as domain names, IP addresses, and email addresses</p> Signup and view all the answers

    What is the primary purpose of using security tokens within an application?

    <p>To authorize users to perform specific actions within an application</p> Signup and view all the answers

    A common penetration testing technique is to fingerprint the target operating system as a first step in the vulnerability identification process.

    <p>True</p> Signup and view all the answers

    What is a primary advantage of using the '-sV' flag with Nmap?

    <p>Identifying known security vulnerabilities based on the identified software version</p> Signup and view all the answers

    Study Notes

    Exam Objectives

    • Knowing the difference between passive and active information gathering
    • Understanding open-source intelligence (OSINT) gathering
    • Using DNS profiling
    • Using Nmap for active scanning
    • Being familiar with enumeration techniques
    • Understanding vulnerabilities in your targets
    • Performing vulnerability scans and analyzing results
    • Mapping vulnerabilities to exploits
    • Learning the types of weaknesses in specialized systems

    Chapter 3: Information Gathering

    • After planning and scoping the penetration testing, the next phase is information gathering and vulnerability identification.
    • Tools are used to discover information about an organization or company before penetration testing begins.
    • Examples of information gathered during this phase:
      • Email addresses and phone numbers of employees (for social engineering)
      • Public IP addresses used by the organization
      • Target systems that are running
      • Open ports on target systems
      • Software used on target systems
      • Whether the software is running in the cloud or is self-hosted

    Chapter 4: Vulnerability Identification

    • After reconnaissance, the next phase is vulnerability identification.
    • Vulnerability scanning is a passive assessment, not an attempt to exploit the system.
    • A vulnerability is a weakness in a system that can be exploited to compromise security.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Untitled Quiz
    48 questions

    Untitled Quiz

    StraightforwardStatueOfLiberty avatar
    StraightforwardStatueOfLiberty
    Use Quizgecko on...
    Browser
    Browser