Understanding Recon and Google Hacking

Understanding Recon and Google Hacking

11th Grade

8 Qs

quiz-placeholder

Similar activities

E-tech:Interactive Multimedia

E-tech:Interactive Multimedia

9th - 12th Grade

10 Qs

Ethical Hacking 1

Ethical Hacking 1

11th - 12th Grade

10 Qs

Cloud Computing

Cloud Computing

9th - 12th Grade

10 Qs

R084 Comic Target Audiences

R084 Comic Target Audiences

9th - 11th Grade

12 Qs

Google Photos

Google Photos

8th - 12th Grade

10 Qs

Direct Marketing

Direct Marketing

11th Grade

12 Qs

Mengenal Lebih Lanjut Browser

Mengenal Lebih Lanjut Browser

1st Grade - University

10 Qs

History of Computer Games Quiz

History of Computer Games Quiz

7th Grade - University

11 Qs

Understanding Recon and Google Hacking

Understanding Recon and Google Hacking

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Gerry Wartenberg

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is Google hacking also known as?

Google Searching

Google Exploring

Google Dorking

Google Browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is Google hacking always illegal?

Yes, always

No, not when done passively

Only on Tuesdays

Yes, but only on weekends

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step a hacker takes when deciding to hack a target?

Sending an email

Visiting the target

Calling the target

Reconnaissance

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of recon involves gathering publicly available information?

Passive recon

Silent recon

Loud recon

Active recon

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Google search operator is used to narrow down searches to a specific site?

inText

site

fileType

inURL

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What can be a potential use of finding publicly available PDFs on a company's website?

Finding recipes

Downloading wallpapers

Learning about company events

Gathering confidential information

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the term used for gathering information about a target?

Hacking

Phishing

Footprinting

Spoofing

8.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What makes an action cross the line from legal to illegal in the context of Google hacking?

Searching on Google

Using the information against the target

Accessing public information

Using a computer