Search Header Logo

Inforamtion Gathering Basic

Authored by Dinesh Dinesh

Science

3rd Grade

Used 5+ times

Inforamtion Gathering Basic
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary purpose of information gathering in cybersecurity?

A. To launch an attack on the target

B. To gather data about the target’s vulnerabilities

C. To exploit the target’s system

D. To protect the attacker’s identity

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a common method for information gathering?

A. Phishing

B. Social engineering

C. Code injection

D. Information gathering

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of information is typically sought during the information gathering phase?

A. Financial records

B. Employee personal data

C. Network infrastructure details

D. Source code

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following describes 'footprinting' in the context of information gathering?

A. Hacking into a system to steal data

B. Gathering information to build a map of the target’s network

C. Planting a virus in the target system

D. Deleting traces of the attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the significance of 'WHOIS' databases in information gathering?

A. They provide details about network vulnerabilities

B. They offer information on domain registration and ownership

C. They list common passwords used in attacks

D. They track email phishing attempts

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What kind of information can be obtained from DNS records during information gathering?

A. Email credentials

B. IP addresses and domain names

C. Financial transactions

D. User passwords

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of passive information gathering?

A. Directly probing the target’s network

B. Social engineering attacks

C. Monitoring public forums and social media

D. Installing spyware on the target’s system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?