What is the definition of Reconnaissance in the context of cybersecurity?
Cybersecurity Lesson 7.1 Review

Quiz
•
Computers
•
9th Grade
•
Easy
Gerry Wartenberg
Used 2+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
The process of removing malware from a computer system.
The act of defending a network against unauthorized access.
The practice of gathering information about targeted computers or networks as a preliminary step toward a further attack.
The method of encrypting sensitive information to protect it from attackers.
2.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What does the Recon / Footprinting step in hacking include?
Techniques to create a full profile of the organization's financial status
Techniques used to create a full profile of the organization and its security posture, including its domain names, IP addresses, and network blocks
Techniques for identifying the personal details of the organization's employees
Techniques for creating a backup of the organization's data
3.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
During reconnaissance, what information is gathered about hosts?
Their physical locations
Their IP addresses and open ports
Their color and size
Their brand and model
4.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is Google Dorking?
A) A game played using Google search
B) The usage of Advanced Search Operators in a Google search
C) A type of hacking attack
D) A Google service for finding images
5.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What happens when you use quotation marks around a set of words in Google search?
A) It excludes those words from the search
B) It searches for each word individually
C) It tells Google to search for the exact phrase
D) It has no effect on the search results
6.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What is a Google Dork also known as?
Google Trick
Google Search
Google Hack
Google Quest
7.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
What does the GHDB specifically target?
A) Google's search algorithms
B) Websites with specific types of vulnerabilities such as posted usernames, passwords, or login portals
C) Google's internal databases
D) Bots performing automated searches
Create a free account and access millions of resources
Similar Resources on Quizizz
16 questions
Searching Algorithms

Quiz
•
9th - 11th Grade
16 questions
Boolean and Search Operators

Quiz
•
9th - 12th Grade
18 questions
Search & Sort Algorithms

Quiz
•
7th - 11th Grade
24 questions
Webpage

Quiz
•
9th - 11th Grade
20 questions
History of Computers & Internet Quiz

Quiz
•
9th - 12th Grade
19 questions
Google Docs

Quiz
•
9th - 12th Grade
16 questions
CIW IBA Lesson 6 Vocabulary

Quiz
•
8th Grade - Professio...
23 questions
Intro to Algorithms

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
27 questions
STAAR English 1 Review

Quiz
•
9th Grade
20 questions
Understanding Linear Equations and Slopes

Quiz
•
9th - 12th Grade