Understanding Recon and Google Hacking

Understanding Recon and Google Hacking

11th Grade

8 Qs

quiz-placeholder

Similar activities

Mengenal Lebih Lanjut Browser

Mengenal Lebih Lanjut Browser

1st Grade - University

10 Qs

ET QUIZ 9

ET QUIZ 9

11th Grade

10 Qs

Security of data

Security of data

11th Grade

10 Qs

Word of the Day Quizizz

Word of the Day Quizizz

5th Grade - University

12 Qs

ETECH Q1

ETECH Q1

11th Grade

11 Qs

Google Hacking and Ethical Hacking Quiz

Google Hacking and Ethical Hacking Quiz

11th Grade

10 Qs

Online Safety

Online Safety

6th - 12th Grade

11 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

Understanding Recon and Google Hacking

Understanding Recon and Google Hacking

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Gerry Wartenberg

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is Google hacking also known as?

Google Searching

Google Exploring

Google Dorking

Google Browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is Google hacking always illegal?

Yes, always

No, not when done passively

Only on Tuesdays

Yes, but only on weekends

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step a hacker takes when deciding to hack a target?

Sending an email

Visiting the target

Calling the target

Reconnaissance

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of recon involves gathering publicly available information?

Passive recon

Silent recon

Loud recon

Active recon

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Google search operator is used to narrow down searches to a specific site?

inText

site

fileType

inURL

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What can be a potential use of finding publicly available PDFs on a company's website?

Finding recipes

Downloading wallpapers

Learning about company events

Gathering confidential information

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the term used for gathering information about a target?

Hacking

Phishing

Footprinting

Spoofing

8.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What makes an action cross the line from legal to illegal in the context of Google hacking?

Searching on Google

Using the information against the target

Accessing public information

Using a computer