4_1_2 Section 4 – Operations and Incident Response - 4.1 – Security Tools - Reconnaissance Tools – Part 2
46 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the curl tool?

  • To perform FTP functions only
  • To retrieve emails from a website
  • To display graphical views of web pages
  • To grab raw data from websites and display it in a terminal screen (correct)

What is the meaning of the 'curl' acronym?

  • Cross-platform URL Reader
  • Common Utility for Resource Linking
  • Command URL Locator
  • Client URL or Uniform Resource Locator (correct)

What is the advantage of using curl to view a website?

  • It allows users to search through the website's source code (correct)
  • It is only available on Linux or Mac OS systems
  • It only works with secure websites using HTTPS
  • It provides a more graphical view of the website

What is the result of running the curl command on www.professormesser.com?

<p>It shows a 301 moved permanently message and redirects to a secure website (B)</p> Signup and view all the answers

What is an advantage of using a pre-configured Linux version like callie?

<p>It has a number of pre-configured reconnaissance tools ready to run (B)</p> Signup and view all the answers

What is the primary difference between viewing a website in a browser and using curl?

<p>The graphical view versus raw HTML data (B)</p> Signup and view all the answers

What is the primary function of the Nmap scripting engine?

<p>To run vulnerability scans and other tests on a device (A)</p> Signup and view all the answers

What is the term used to describe the information gathered from public websites?

<p>OSINT (Open Source Intelligence) (B)</p> Signup and view all the answers

What is the primary function of the Harvester tool?

<p>To gather open source intelligence from public websites (B)</p> Signup and view all the answers

What is the purpose of running a Nmap scan with the verbose option?

<p>To gather more information about the scan process (D)</p> Signup and view all the answers

What is the role of the Sniper tool in reconnaissance?

<p>To combine the results of multiple reconnaissance tools (A)</p> Signup and view all the answers

What type of scans can be run using the Nmap tool?

<p>Vulnerability scans and service scans (D)</p> Signup and view all the answers

What is the benefit of using the Harvester tool?

<p>It reduces the time and effort required to gather information (C)</p> Signup and view all the answers

What is the purpose of the Sniper tool's stealth mode?

<p>To avoid detection by the target device (A)</p> Signup and view all the answers

What type of information can be gathered using the Harvester tool?

<p>A variety of information from public websites and sources (D)</p> Signup and view all the answers

What is the risk of using reconnaissance tools like Sniper?

<p>They may cause denial of service situations (B)</p> Signup and view all the answers

What is the purpose of the curl command?

<p>To view the source code of a website as HTML (C)</p> Signup and view all the answers

What is the primary difference between the ping command and the hping command?

<p>The hping command can modify almost everything about the packet (A)</p> Signup and view all the answers

What is the potential risk of using IP scanning tools?

<p>Denial of service to other devices on the network (B)</p> Signup and view all the answers

What is the purpose of the sudo command in the hping command?

<p>To run the command with elevated rights and permissions (B)</p> Signup and view all the answers

What is the function of the Nmap tool?

<p>To identify open ports on a device and the operating system (B)</p> Signup and view all the answers

What is the result of running the hping command with the scan option and specifying ports 80 through 443?

<p>Ports 80 and 443 are open on the device (B)</p> Signup and view all the answers

What is the advantage of using hping over the ping command?

<p>Hping can modify almost everything about the packet (A)</p> Signup and view all the answers

What is the purpose of the ARP technique in IP scanning?

<p>To find devices on a local subnet (A)</p> Signup and view all the answers

What is the difference between hping and Nmap?

<p>Hping is used for port scanning, while Nmap is used for identifying open ports and operating systems (A)</p> Signup and view all the answers

What is the purpose of the ICMP timestamp request technique in IP scanning?

<p>To identify devices on a network (B)</p> Signup and view all the answers

What is a potential issue when performing a port scan?

<p>The device performing the scan may be easily identified as the source. (D)</p> Signup and view all the answers

What is the purpose of the scanless utility?

<p>To perform a port scan through a proxy. (B)</p> Signup and view all the answers

What is the dnsenum command used for?

<p>To enumerate DNS information from a DNS server. (B)</p> Signup and view all the answers

What is the purpose of the sniper query?

<p>To gather information about a target domain using multiple tools. (A)</p> Signup and view all the answers

What is the spider IP service used for?

<p>To provide a proxy for port scanning. (C)</p> Signup and view all the answers

What is the result of running a sniper query on example.com?

<p>A set of information gathered from multiple tools and sources. (B)</p> Signup and view all the answers

What is the purpose of the Nmap tool?

<p>To perform a port scan on a target host. (B)</p> Signup and view all the answers

What is the advantage of using a proxy service like scanless?

<p>It hides the source of the scan. (A)</p> Signup and view all the answers

What is the result of running a dnsenum query on example.com?

<p>A set of DNS information gathered from the DNS server and other sources. (A)</p> Signup and view all the answers

What is the purpose of the brute force feature in dnsenum?

<p>To identify subdomains and hosts on a target domain. (C)</p> Signup and view all the answers

What is the purpose of the Nessus scanner?

<p>To scan a remote IP address for vulnerabilities (B)</p> Signup and view all the answers

What was the result of running the Nessus scanner against a single IP address?

<p>It found 71 informational vulnerabilities and some high and critical vulnerabilities (A)</p> Signup and view all the answers

What is the purpose of the Cuckoo sandbox?

<p>To run programs in a virtualized environment to identify malware (D)</p> Signup and view all the answers

Why is it not recommended to run an executable on a production machine to test it?

<p>It may contain malware or be malicious (D)</p> Signup and view all the answers

What is the benefit of using Nessus to scan many different IP addresses or ranges of IP addresses?

<p>It can create a database of vulnerabilities to identify safer systems (A)</p> Signup and view all the answers

What was the critical vulnerability identified by Nessus regarding the Unix operating system?

<p>Unsupported version detection (D)</p> Signup and view all the answers

What type of analysis can Cuckoo perform on an executable?

<p>API calls and memory analysis (C)</p> Signup and view all the answers

What is the advantage of using Cuckoo to evaluate executables?

<p>It can run executables safely without risking the production environment (C)</p> Signup and view all the answers

What is the benefit of Nessus's extensive reporting and information?

<p>It helps identify vulnerabilities and provides solutions to resolve them (B)</p> Signup and view all the answers

What is the limitation of the Unix operating system vulnerability identified by Nessus?

<p>It is no longer supported by the vendor (C)</p> Signup and view all the answers

More Like This

Impact of Chilli Leaf Curl Virus on Fruit Yield
40 questions
Soft Curl Perm Flashcards
32 questions
Soft Curl Permanent Wave Flashcards
7 questions
Hair Styling: Pin Curl Techniques
8 questions

Hair Styling: Pin Curl Techniques

CostEffectiveGeometry7047 avatar
CostEffectiveGeometry7047
Use Quizgecko on...
Browser
Browser