NWIT246 - Midterm Examination [Questions from TestOut | Chapters 1-7]

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/166

flashcard set

Earn XP

Description and Tags

These include the PRACTICE QUESTIONS from TestOut Ethical Hacker, in order, from Chapters 1 through 7 for the NWIT246 Attacker Tools & Techniques class.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

167 Terms

1
New cards

Penetration testing is the practice of finding vulnerabilities and risks with the purpose of securing a computer or network. Penetration testing falls under which all-encompassing term?

Red teaming
Blue teaming
Ethical hacking
Network scanning

Ethical hacking

2
New cards

Heather is performing a penetration test. She has gathered a lot of valuable information about her target already. Heather has used some hacking tools to determine that, on her target network, a computer named Production Workstation has port 445 open. Which step in the ethical hacking methodology is Heather performing?

Reconnaissance
Maintain access
Gain access
Scanning and enumeration

Scanning and enumeration

3
New cards

Which of the following is the third step in the ethical hacking methodology?

Clear your tracks
Gain access
Scanning and enumeration
Reconnaissance

Gain access

4
New cards

Miguel is performing a penetration test on his client's web-based application. Which penetration test frameworks should Miguel utilize?

OSSTMM
OWASP
ISO/IEC 27001
NIST SP 800-115

OWASP

5
New cards

The penetration testing life cycle is a common methodology used when performing a penetration test. This methodology is almost identical to the ethical hacking methodology. Which of the following is the key difference between these methodologies?

Gain access
Reconnaissance
Reporting
Maintain access

Reporting

6
New cards

You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing?

Black hat
White box
Black box
White hat

Black box

7
New cards

Which of the following best describes a gray box penetration test?

The ethical hacker is given full knowledge of the target or network.
The ethical hacker is given strict guidelines about what can be targeted.
The ethical hacker has no information regarding the target or network.
The ethical hacker has partial information about the target or network.

The ethical hacker has partial information about the target or network.

8
New cards

Randy was just hired as a penetration tester for the red team. Which of the following best describes the red team?

Is a team of specialists that focus on the organization's defensive security.
Is responsible for establishing and implementing policies.
Performs offensive security tasks to test the network's security.
Acts as a pipeline between teams and can work on any side.

Performs offensive security tasks to test the network's security.

9
New cards

The Stuxnet worm was discovered in 2010 and was used to gain sensitive information on Iran's industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target. Which type of attack was Stuxnet?

APT
Virus
Logic bomb
Trojan horse

APT

10
New cards

Which type of threat actor only uses skills and knowledge for defensive purposes?

Hacktivist
White hat
Gray hat
Script kiddie

White hat

11
New cards

Which statement best describes a suicide hacker?

This hacker may cross the line of what is ethical, but usually has good intentions and isn't being malicious.
This hacker is motivated by religious or political beliefs and wants to create severe disruption or widespread fear.
This hacker is only concerned with taking down their target for a cause. They have no concerns about being caught.
This hacker's main purpose is to protest an event and draw attention to their views and opinions.

This hacker is only concerned with taking down their target for a cause. They have no concerns about being caught.

12
New cards

Miguel has been practicing his hacking skills. He has discovered a vulnerability on a system that he did not have permission to attack. Once Miguel discovered the vulnerability, he anonymously alerted the owner and instructed him how to secure the system. What type of hacker is Miguel in this scenario?

State-sponsored
Gray hat
White hat
Script kiddie

Gray hat

13
New cards

The process of analyzing an organization's security and determining its security holes is known as:

Ethical hacking
Enumeration
Threat modeling
Penetration testing

Threat modeling

14
New cards

Which of the following documents details exactly what can be tested during a penetration test?

Rules of Engagement
Scope of Work
Master Service Agreement
Non-Disclosure Agreement

Scope of Work

15
New cards

After performing a risk assessment, an organization must decide what areas of operation can be included in a penetration test and what areas cannot be included. Which of the following describes the process?

Mitigation
Avoidance
Tolerance
Transference

Tolerance

16
New cards
<p><strong>You are performing a penetration test of a local area network (LAN). Refer to the circled area on the network diagram. Which of the following types of penetration tests is being performed?</strong></p><p>Gray Box<br>Black Box<br>External<br>Internal</p>

You are performing a penetration test of a local area network (LAN). Refer to the circled area on the network diagram. Which of the following types of penetration tests is being performed?

Gray Box
Black Box
External
Internal

Internal

17
New cards

Miguel is performing a penetration test on a web server. Miguel was given only the server's IP address and name. Which of the following best describes the type of penetration test Miguel is performing?

White box
Black box
Internal
External

External

18
New cards

Which of the following elements is generally considered the weakest link in an organization's security?

Servers
Human
Physical
Network

Human

19
New cards

Which of the following best describes social engineering?

The process of analyzing an organization's security and locating security holes.
The art of deceiving and manipulating others into doing what you want.
Sending an email that appears to be from a bank to trick the target into entering their credentials on a malicious website.
A stealthy computer network attack in which a person or group gains unauthorized access for an extended period.

The art of deceiving and manipulating others into doing what you want.

20
New cards

Which of the following is considered a mission-critical application?

Support log
Medical database
Customer database
Video player

Medical database

21
New cards

What does an organization do to identify areas of vulnerability within their network and security systems?

External test
Scanning
Internal test
Risk assessment

Risk assessment

22
New cards

During a risk assessment, the organization determines that the risk of collecting personal data from its customers is not acceptable and stops. What method of dealing with risk is the organization using?

Transference
Mitigation
Acceptance
Avoidance

Avoidance

23
New cards

The following formula defines which method of dealing with risk?
Cost of Risk > Damage = Risk _________

Mitigation
Avoidance
Acceptance
Transference

Acceptance

24
New cards

Which of the following is a consideration when scheduling a penetration test?

Who is aware of the test?
Which systems are being tested?
Are there any security exceptions?
What risks are acceptable?

Who is aware of the test?

25
New cards

A client asking for small deviations from the scope of work is called:

Rules of engagement
Change order
Security exception
Scope creep

Scope creep

26
New cards

Heather is in the middle of performing a penetration test when her client asks her to also check the security of an additional server. Which of the following documents does she need to submit before performing the additional task?

Rules of engagement
Permission to test
Scope of work
Change order

Change order

27
New cards

Which of the following is a deviation from standard operating security protocols

Whitelisting
MAC filtering
Blacklisting
Security exception

Security exception

28
New cards

Miguel is performing a penetration test. His client needs to add Miguel's computer to the list of devices allowed to connect to the network. What type of security exception is this?

Black box
Whitelisting
White box
Blacklisting

Whitelisting

29
New cards

Which type of penetration test is required to ensure an organization is following federal laws and regulations?

Objective-based
White box
Goal-based
Compliance-based

Compliance-based

30
New cards

Which of the following defines the security standards for any organization that handles cardholder information for any type of payment card?

FISMA
HIPAA
PCI DSS
DMCA

PCI DSS

31
New cards

Michael is performing a penetration test for a hospital. Which federal regulation does Michael need to ensure he follows?

DMCA
HIPAA
FISMA
PCI DSS

HIPAA

32
New cards

Charles found a song he wrote being used without his permission in a video on YouTube. Which law will help him protect his work?

FISMA
HIPAA
DMCA
PCI DSS

DMCA

33
New cards

Which of the following best describes what FISMA does?

Defines the security standards for any organization that handles cardholder information
Defines standards that ensure medical information is kept safe.
Defines how federal government data, operations, and assets are handled.
Implements accounting and disclosure requirements that increase transparency.

Defines how federal government data, operations, and assets are handled.

34
New cards

Which of the following best describes what SOX does?

Defines standards that ensure medical information is kept safe.
Implements accounting and disclosure requirements that increase transparency.
Defines how federal government data, operations, and assets are handled.
Defines the security standards for any organization that handles cardholder information.

Implements accounting and disclosure requirements that increase transparency.

35
New cards

Which of the following is a limitation of relying on regulations?

The industry standards take precedence.
They allow interpretation.
They are regularly updated.
They rely heavily on password policies.

They rely heavily on password policies.

36
New cards

Which of the following best describes a goal-based penetration test?

Focuses on the end results. The hacker determines the methods.
The hacker has been given full information about the target.
Focuses on the overall security of the organization and its data security.
Ensures the organization follows federal laws and regulations.

Focuses on the end results. The hacker determines the methods.

37
New cards

A goal-based penetration test needs to have specific goals. Using SMART goals is extremely useful for this. What does SMART stand for

Specific/Maintainable/Attainable/Relevant/Timely
Specific/Measurable/Attainable/Relevant/Timely
Steps/Measurable/Affordable/Results/Tuned
Steps/Maintainable/Affordable/Results/Tuned

Specific/Measurable/Attainable/Relevant/Timely

38
New cards

Which document explains the details of an objective-based test?

Scope of work
Change order
Rules of engagement
Permission to test

Scope of work

39
New cards

Which of the following best describes a supply chain?

A company provides materials to another company to manufacture a product.
A company sells their products on Amazon and has Amazon ship the product.
A company stores their product at a distribution center.
A company stocks their product at a store.

A company provides materials to another company to manufacture a product.

40
New cards

Heather has been hired to work in a firm's cybersecurity division. Her role will include performing both offensive and defensive tasks. Which of the following roles applies to Heather?

A gray hat hacker.
A member of the red team.
A member of the purple team.
A black hat hacker.

A member of the purple team.

41
New cards

ABC company is in the process of merging with XYZ company. As part of the merger, a penetration test has been recommended. Testing the network systems, physical security, and data security have all been included in the scope of work. What else should be included in the scope of work

Company culture
Email policies
Employee IDs
Password policies

Company culture

42
New cards

Hannah is working on the scope of work with her client. During the planning, she discovers that some of the servers are cloud-based servers. Which of the following should she do?

Tell the client she can't perform the test.
Get a non-disclosure agreement.
Add the cloud host to the scope of work.
Not worry about this fact and test the servers.

Add the cloud host to the scope of work.

43
New cards

During an authorized penetration test, Michael discovered his client's financial records. Which of the following should he do?

Sell the records to a competitor.
Ignore the records and move on.
Continue digging and look for illegal activity.
Make a backup of the records for the client.

Ignore the records and move on.

44
New cards

During a penetration test, Heidi runs into an ethical situation she's never faced before and is unsure how to proceed. Which of the following should she do?

Reach out to an attorney for legal advice.
Trust her instincts and do what she feels is right.
Ignore the situation and just move on.
Talk with her friend and do what they suggest.

Reach out to an attorney for legal advice.

45
New cards

What are the rules and regulations defined and put in place by an organization called?

Master service agreement
Rules of engagement
Corporate policies
Scope of work

Corporate policies

46
New cards

Which of the following is a common corporate policy that would be reviewed during a penetration test?

Purchasing policy
Meeting policy
Password policy
Parking policy

Password policy

47
New cards

Which of the following policies would cover what you should do in case of a data breach?

Password policy
Sensitive data handling policy
Update frequency policy
Corporate data policy

Sensitive data handling policy

48
New cards

Yesenia was recently terminated from her position, where she was using her personal cell phone for business purposes. Upon termination, her phone was remotely wiped. Which of the following corporate policies allows this action?

Corporate policy
Password policy
Update policy
BYOD policy

BYOD policy

49
New cards

During a penetration test, Mitch discovers the following on a client's computer.

  • Instructions for creating a bomb

  • Emails threatening a public official

  • Maps to the officials home and office

Which of the following actions should he take?

Ignore the files and continue with the penetration test.
Delete the files and continue with the penetration test.
Stop the test, inform the client, and let them handle it.
Immediately stop the test and report the finding to the authorities.

Immediately stop the test and report the finding to the authorities.

50
New cards

Heather is working for a cybersecurity firm based in Florida. She will be conducting a remote penetration test for her client, who is based in Utah. Which state's laws and regulations will she need to adhere to

Heather will adhere to Florida's laws, and the client will adhere to Utah's laws.
Both companies will need to adhere to Utah's laws.
A lawyer should be consulted on which laws to adhere to and both parties agree.
Both companies will need to adhere to Florida's laws.

A lawyer should be consulted on which laws to adhere to and both parties agree.

51
New cards

United States Code Title 18, Chapter 47, Section 1029 deals with which of the following?

Fraud and related activity involving access devices.
Fraud and related activity involving electronic mail.
Fraud and related activity regarding identity theft.
Fraud and related activity involving computers.

Fraud and related activity involving access devices.

52
New cards

Which of the following best describes the Wassenaar Arrangement?

A law that defines how federal government data, operations, and assets are handled.
An agreement between 41 countries to enforce similar export controls for weapons, including intrusion software.
A law that defines the security standards for any organization that handles cardholder information.
Standards that ensure medical information is kept safe and is only shared with the patient and medical professionals.

An agreement between 41 countries to enforce similar export controls for weapons, including intrusion software.

53
New cards

Which of the following best describes the rules of engagement document?

Used as a last resort if the penetration tester is caught in the scope of their work.
A contract where parties agree to most of the terms that will govern future actions.
Defines if the test will be a white box, gray box, or black box test and how to handle sensitive data.
A very detailed document that defines exactly what is going to be included in the penetration test.

Defines if the test will be a white box, gray box, or black box test and how to handle sensitive data.

54
New cards

Which of the following best describes a master service agreement?

A contract where parties agree to the terms that will govern future actions.
Used as a last resort if the penetration tester is caught in the scope of their work.
Defines if the test will be a white box, gray box, or black box test and how to handle sensitive data.
A very detailed document that defines exactly what is going to be included in the penetration test.

A contract where parties agree to the terms that will govern future actions.

55
New cards

Which of the following best describes a non-disclosure agreement?

A common legal contract outlining confidential material that will be shared during the assessment.
A contract where parties agree to most of the terms that will govern future actions.
A document that defines if the test will be a white box, gray box, or black box test and how to handle sensitive data.
A very detailed document that defines exactly what is going to be included in the penetration test.

A common legal contract outlining confidential material that will be shared during the assessment.

56
New cards

During a penetration test, Dylan is caught testing the physical security. Which document should Dylan have on his person to avoid being arrested?

Scope of work
Master service agreement
Permission to test
Rules of engagement

Permission to test

57
New cards

Social engineers are master manipulators. Which of the following are tactics they might use?

Keylogging, shoulder surfing, and moral obligation
Shoulder surfing, eavesdropping, and keylogging
Eavesdropping, ignorance, and threatening
Moral obligation, ignorance, and threatening

Moral obligation, ignorance, and threatening

58
New cards

Which of the following best describes a script kiddie?

A hacker who helps companies see the vulnerabilities in their security.
A hacker who uses scripts written by much more talented individuals.
A hacker willing to take more risks because the payoff is a lot higher.
A hacker whose main purpose is to draw attention to their political views.

A hacker who uses scripts written by much more talented individuals.

59
New cards

Any attack involving human interaction of some kind is referred to as:

A white hat hacker
Attacker manipulation
An opportunistic attack
Social engineering

Social engineering

60
New cards

Using a fictitious scenario to persuade someone to perform an action or give information they aren't authorized to share is called:

Footprinting
Preloading
Pretexting
Impersonation

Pretexting

61
New cards

Ron, a hacker, wants to get access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs. Which phase of the social engineering process is Ron in?

Exploitation phase
Elicitation phase
Development phase
Research phase

Development phase

62
New cards

You are instant messaging a coworker, and you get a malicious link. Which type of social engineering attack is this?

Surf
Spim
Hoax
Spam

Spim

63
New cards

Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him. Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack is Fred referring to?

Eavesdropping
Spam and spim
Keyloggers
Shoulder surfing

Shoulder surfing

64
New cards

Which of the following best describes an inside attacker?

An agent who uses their technical knowledge to bypass security.
An unintentional threat actor; the most common threat.
An attacker with lots of resources and money at their disposal.
A good guy who tries to help a company see their vulnerabilities.

An unintentional threat actor; the most common threat.

65
New cards

Compliments, misinformation, feigning ignorance, and being a good listener are tactics of which social engineering technique?

Interrogation
Elictitation
Impersonation
Preloading

Elictitation

66
New cards

You get a call from one of your customers. The customer is asking about an employees username. What should you do?

You should not provide any information and forward the call to the help desk.
You should provide the information as part of quality customer service.
You should not provide any information except your manager's name and number.
You should put the caller on hold and then hang up.

You should not provide any information and forward the call to the help desk.

67
New cards

Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked. How did the attacker accomplish this hack?

DNS cache poisoning
Social networking
Feigning ignorance
Host file modification

DNS cache poisoning

68
New cards

An attack that targets senior executives and high-profile victims is referred to as:

Whaling
Vishing
Pharming
Scrubbing

Whaling

69
New cards

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. What could you do to add an additional layer of security to this organization?

Train the receptionist to keep her iPad in a locked drawer.
Require users to use workstation screensaver passwords.
Replace the biometric locks with smart cards.
Move the receptionist's desk into the secured area.

Train the receptionist to keep her iPad in a locked drawer.

70
New cards

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following would you most likely implement to keep this from happening in the future?

Scrubbing
Anti-passback
Mantraps
Cable locks

Mantraps

71
New cards

Implementing emergency lighting that runs on protected power and automatically switches on when the main power goes off is part of which physical control?

Physical access logs
Physical access controls
Perimeter barriers
Employee and visitor safety

Employee and visitor safety

72
New cards

Closed-circuit television can be used as both a preventative tool (to monitor live events) or as an investigative tool (to record events for later playback). Which camera is more vandal-resistant than other cameras?

A Pan Tilt Zoom camera
A dome camera
A bullet camera
A c-mount camera

A dome camera

73
New cards

Important aspects of physical security include which of the following?

Preventing interruptions of computer services caused by problems such as fire.
Implementing adequate lighting in parking lots and around employee entrances.
Identifying what was broken into, what is missing, and the extent of the damage.
Influencing the target's thoughts, opinions, and emotions before something happens.

Preventing interruptions of computer services caused by problems such as fire.

74
New cards

What are the three factors to keep in mind with physical security?

Detection, prevention, and implementation
Detection, implementation, and prevention
Implementation, detection, and recovery
Prevention, detection, and recovery

Prevention, detection, and recovery

75
New cards

A person in a dark grey hoodie has jumped the fence at your research center. A security guard has detained this person, denying him physical access. Which of the following areas of physical security is the security guard currently in?

Security sequence
Physical control
Security factors
Layered defense

Security sequence

76
New cards

Which of the following best describes a lock shim?

When the pins are scraped quickly.
A cut to the number nine position.
A small, angled, and pointed tool.
A thin, stiff piece of metal.

A thin, stiff piece of metal.

77
New cards

On her way to work, Angela accidentally left her backpack with a company laptop at the coffee shop. What type of threat has she caused the company?

Man-made threat
Environmental threat
External threat
Cloud threat

Man-made threat

78
New cards

The U.S. Department of Commerce has an agency with the goal of protecting organizational operations, assets, and individuals from threats such as malicious cyber-attacks, natural disasters, structural failures, and human errors. Which of the following agencies was created for this purpose?

CAPEC
NVD
Correct Answer:
NIST
JPCERT

NIST

79
New cards

Which type of attack involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing the install operating system?

Environmental attack
Man-made attack
Opportunistic attack
Physical attack

Physical attack

80
New cards

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once per week. For security reasons, your company has decided not to store a redundant copy of the backup media at an off-site location. Which of the following would be the best backup and storage option?

Use incremental backups and store them in a drawer in your office.
Use differential backups and store them on a shelf next to the backup device.
Use incremental backups and store them in a locked fireproof safe.
Use differential backups and store them in a locked room.

Use incremental backups and store them in a locked fireproof safe.

81
New cards

You are in the process of implementing policies and procedures that require employee identification. You observe employees holding a secure door for others to pass through. Which of the following training sessions should you implement to help prevent this in the future?

Why employees should never share their ID badge with anyone.
What to do if you encounter a person without a badge.
Why employees should wear their badge at all times.
How to prevent piggybacking and tailgating.

How to prevent piggybacking and tailgating.

82
New cards

You have a set of DVD-RW discs that were used to archive files from your latest project. You need to prevent the sensitive information on the discs from being compromised. Which of the following methods should you use to destroy the data?

Delete the data on the discs.
Shred the discs.
Write junk data on the discs.
Degauss the discs.

Shred the discs.

83
New cards

Which of the following best describes a physical barrier used to deter an aggressive intruder?

Double-entry doors
Large flowerpots
Alarmed carrier PDS
Anti-passback system

Large flowerpots

84
New cards

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following is the best solutions for securing Joe's workstation?

Configure the screen saver to require a password.
Set a strong password, that require special characters.
Apply multifactor authentication on his computer.
Change the default account names and passwords.

Configure the screen saver to require a password.

85
New cards

When a penetration tester starts gathering details about employees, vendors, business processes, and physical security, which phase of testing are they in?

Reconnaissance
Covering tracks
Scanning
Gaining access

Reconnaissance

86
New cards

Which of the following elements of penetration testing includes the use of web surfing, social engineering, dumpster diving, and social networking?

Permission and documentation
Information types
Information gathering techniques
Maintaining access

Information gathering techniques

87
New cards

MinJu, a penetration tester, is testing a client's security. She notices that every Wednesday, a few employees go to a nearby bar for happy hour. She goes to the bar and starts befriending one of the employees with the intention of learning the employee's personal information. Which information gathering technique is MinJu using?

Social engineering
Dumpster diving
Web surfing
Social networking

Social engineering

88
New cards

A penetration tester is trying to extract employee information during the reconnaissance phase. What kinds of data is the tester collecting about the employees

Geographical information, entry control systems, employee routines, and vendor traffic
Contact names, phone numbers, email addresses, fax numbers, and addresses
Intellectual property, critical business functions, and management hierarchy
Operating systems, applications, security policies, and network mapping

Contact names, phone numbers, email addresses, fax numbers, and addresses

89
New cards

Which of the following is the difference between an ethical hacker and a criminal hacker?

An ethical hacker is nice, clean, and polite, but a criminal hacker isn't.
An ethical hacker has permission to hack a system, and a criminal hacker doesn't have permission.
A criminal hacker is all-knowing, but an ethical hacker isn't.
A criminal hacker is easily detected, but an ethical hacker isn't.

An ethical hacker has permission to hack a system, and a criminal hacker doesn't have permission.

90
New cards

Whois, Nslookup, and ARIN are all examples of:

Internet research tools
Network footprinting tools
IoT hacking tools
Google hacking tools

Network footprinting tools

91
New cards

Iggy, a penetration tester, is conducting a black box penetration test. He wants to do reconnaissance by gathering information about ownership, IP addresses, domain name, locations, and server types. Which of the following tools would be most helpful

beSTORM
Nslookup
ARIN
Whois

Whois

92
New cards

What does the Google Search operator allinurl:keywords do?

Displays websites where directory browsing has been enabled.
Displays web sites similar to the one listed.
Shows results in pages that contain the keyword in the title.
Shows results in pages that contain all of the listed keywords.

Shows results in pages that contain all of the listed keywords.

93
New cards

What's the name of the open-source forensics tool that can be used to pull information from social media postings and find relationships between companies, people, email addresses, and other information?

Wayback Machine
Maltego
Echosec
Google Earth

Maltego

94
New cards

Xavier is doing reconnaissance. He is gathering information about a company and its employees by going through their social media content. Xavier is using a tool that pulls information from social media postings that were made using location services. What is the name of this tool?

Wayback Machine
Google Maps
Echosec
Maltego

Echosec

95
New cards

You are in the reconnaissance phase at the XYZ company. You want to use nmap to scan for open ports and use a parameter to scan the 1,000 most common ports. Which nmap command would you use?

nmap -sV xyzcompany.com
nmap -sA xyzcompany.com
nmap -sS xyzcompany.com
nmap -sT xyzcompany.com

nmap -sS xyzcompany.com

96
New cards

You have found the IP address of a host to be 172.125.68.30. You want to see what other hosts are available on the network. Which of the following nmap commands would you enter to do a ping sweep?

nmap -sU 172.125.68. 1-255
nmap -sS 172.125.68. 1-255
nmap -sn 172.125.68. 1-255
nmap -sM 172.125.68. 1-255

nmap -sn 172.125.68. 1-255

97
New cards

Which of the following services is most targeted during the reconnaissance phase of a hacking attack?

TLS
DHCP
DNS
DoS

DNS

98
New cards

Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take?

Limit the sharing of critical information in press releases, annual reports, product catalogs, or marketing materials.
Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.
Implement policies that restrict the sharing of sensitive company information on employees' personal social media pages.
Review company websites to see what type of sensitive information is being shared.

Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.

99
New cards

Julie configures two DNS servers, one internal and one external, with authoritative zones for the corpnet.xyz domain. One DNS server directs external clients to an external server. The other DNS server directs internal clients to an internal server. Which of the following DNS countermeasures is she implementing

Information sharing policy
Proxy server
Split DNS
DNS propagation

Split DNS

100
New cards

Which of the following information sharing policies addresses the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials?

A printed materials policy
An employee social media policy
A company social media policy
An internet policy

A printed materials policy