Untitled Quiz
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is an example of passive reconnaissance?

  • Attacker as a fake person for Help Desk support
  • Telephonic calls to target victim
  • Talk to the target user in person
  • Search about target records in online people database (correct)
  • What is the primary purpose of Google Dorks in reconnaissance?

  • To narrow down search results (correct)
  • To perform port scanning
  • To scan network vulnerabilities
  • To sweep ports logically
  • Which of the following is NOT a scanning methodology?

  • Sweeping
  • Port Scanning
  • Vulnerability scanning
  • Google Dorks (correct)
  • What is the primary function of Maltego in ethical hacking?

    <p>To acquire information about target user</p> Signup and view all the answers

    Which phase comes after scanning in ethical hacking?

    <p>Gaining access</p> Signup and view all the answers

    In which phase does the hacker exploit the network or system vulnerabilities?

    <p>Gaining access</p> Signup and view all the answers

    What is the risk if a system is not properly tested in scanning and gaining access phase?

    <p>A hacker can gain access illegally</p> Signup and view all the answers

    What is the primary goal of reconnaissance in ethical hacking?

    <p>To acquire information about target user</p> Signup and view all the answers

    What is the primary goal of the reconnaissance phase in ethical hacking?

    <p>To gather information about the target user or system</p> Signup and view all the answers

    Which of the following tools is used for scanning the network for vulnerabilities?

    <p>Nexpose</p> Signup and view all the answers

    What is the difference between active and passive reconnaissance?

    <p>Active reconnaissance is done directly, while passive reconnaissance is done indirectly</p> Signup and view all the answers

    Which of the following is an example of passive reconnaissance?

    <p>Searching public records</p> Signup and view all the answers

    What is the purpose of using Google Dorks in reconnaissance?

    <p>To gather information about the target user or system</p> Signup and view all the answers

    How many subtypes of reconnaissance are there?

    <p>2</p> Signup and view all the answers

    What is the primary difference between active and passive reconnaissance in terms of interaction?

    <p>Active reconnaissance involves direct interaction, while passive reconnaissance involves indirect interaction</p> Signup and view all the answers

    Which of the following is NOT a characteristic of passive reconnaissance?

    <p>Using social engineering tactics</p> Signup and view all the answers

    What is the primary focus of forensic science in the context of digital investigations?

    <p>Application of science to investigation and prosecution of crime or to the just resolution of conflict</p> Signup and view all the answers

    What is the primary goal of reconnaissance in digital investigations?

    <p>To conduct a reconnaissance probe of the target website</p> Signup and view all the answers

    What is the purpose of preservation of digital evidence?

    <p>To analyze digital evidence</p> Signup and view all the answers

    What is the next step after seizing digital evidence in an investigation?

    <p>Examination of digital evidence</p> Signup and view all the answers

    What type of analysis is used to establish relationships between different pieces of digital evidence?

    <p>Relational analysis</p> Signup and view all the answers

    What is the purpose of hashing in digital investigations?

    <p>To authenticate digital evidence</p> Signup and view all the answers

    What is the primary goal of digital investigations?

    <p>To gather evidence for legal action</p> Signup and view all the answers

    What is the purpose of experimentation in digital investigations?

    <p>To analyze digital evidence</p> Signup and view all the answers

    Study Notes

    Information Gathering in Ethical Hacking

    • Reconnaissance is the phase where ethical hackers gather information about the target user or system.
    • It involves tools and techniques such as Hping, NMAP, and Google Dorks.

    Types of Reconnaissance

    • There are two subtypes of reconnaissance: Active and Passive Reconnaissance.
    • Active Reconnaissance involves interacting with the target user or system directly to gain information.
    • Examples of Active Reconnaissance include telephone calls as a help desk or fake customer care person.
    • Passive Reconnaissance involves gathering information indirectly without interacting with the target user or system.
    • Examples of Passive Reconnaissance include searching public records, searching online people databases, or looking for target details in paper files.

    Scanning Methodologies

    • Scanning is a phase that comes after reconnaissance and involves using tools to identify vulnerabilities in a system.
    • Scanning methodologies include Vulnerability Scanning, Sweeping, and Port Scanning.
    • Google Dorks is not a scanning tool, but rather a reconnaissance tool used for gathering information about a target user.

    Ethical Hacking Phases

    • The phases of ethical hacking are: Reconnaissance, Scanning, Gaining Access, and Maintaining Access.
    • Gaining access is the phase where ethical hackers exploit vulnerabilities in a system or network.
    • Maintaining access is the phase where access is maintained to ensure continued control over the system or network.

    Forensic Science and Digital Investigations

    • Forensic science is the application of science to investigation and prosecution of crime or to the just resolution of conflict.
    • Digital investigations can involve principles of forensic science.
    • Preservation of digital evidence involves collecting computer hardware, making a forensic image of storage media, and copying necessary files.
    • Examination of digital evidence includes activities such as seizure, preservation, and documentation, as well as recovery, harvesting, and reduction.
    • Analysis of digital evidence includes activities such as experimentation, fusion, and correlation.

    Digital Evidence Analysis

    • Analysis of digital evidence involves relating evidence to its source using IP addresses, MD5 values, filenames, and date-time stamps.
    • Different types of analysis include relational (e.g., link analysis) and temporal (e.g., timeline analysis).
    • When investigating a website, it is necessary to determine the location of the web servers before obtaining authorization to seize the systems.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Use Quizgecko on...
    Browser
    Browser