Chapter 5: Reconnaissance and Intelligence Gathering

Chapter 5: Reconnaissance and Intelligence Gathering

Professional Development

20 Qs

quiz-placeholder

Similar activities

NMC-IT PD 2024

NMC-IT PD 2024

Professional Development

20 Qs

IP Addressing

IP Addressing

Professional Development

20 Qs

SENAI 2024 | REDES 4

SENAI 2024 | REDES 4

Professional Development

15 Qs

Quiz sobre Camadas do Modelo OSI

Quiz sobre Camadas do Modelo OSI

Professional Development

15 Qs

Cuestionario Nivel

Cuestionario Nivel

Professional Development

22 Qs

Class Quiz

Class Quiz

Professional Development

25 Qs

Prelim: Networking II

Prelim: Networking II

Professional Development

20 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

Chapter 5: Reconnaissance and Intelligence Gathering

Chapter 5: Reconnaissance and Intelligence Gathering

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Velazquez

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Megan wants to use the Metasploit Framework to conduct a web application vulnerability scan. What module from the following list is best suited to her needs?

  1. smb_login

  1. Angry IP

  1. nmap

  1. wmap

Answer explanation

The wmap scanner is a web application scanner module for the Metasploit Framework that can scan for vulnerable web applications. The smb_login tool looks for SMB shares, not web applications. Angry IP Scanner is not integrated with Metasploit, and nmap is a port scanner, not a full web application vulnerability scanner.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What flag does nmap use to enable operating system identification?

  1. –os

  1. –id

  1. –O

  1. –osscan

Answer explanation

Nmap's operating system identification flag is –O and it enables OS detection. –A also enables OS identification and other features. –osscan with modifiers like –limit and –guess set specific OS identification features. –os and –id are not nmap flags.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What command-line tool can be used to determine the path that traffic takes to a remote system?

  1. Whois

  1. traceroute

  1. nslookup

  1. routeview

Answer explanation

Traceroute (or tracert on Windows systems) is a command-line tool that uses ICMP to trace the route that a packet takes to a host. Whois and nslookup are domain tools, and routeview is not a command-line tool.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Valerie wants to use a graphical interface to control nmap and wants to display her scans as a visual map to help her understand her target networks. What tool from the following list should she use?

  1. Angry IP Scanner

  1. wmap

  1. Zenmap

  1. nmap-gs

Answer explanation

Zenmap is a graphical user interface for nmap that also supports graphical output, including visual maps of networks. Valerie can use Zenmap to control nmap and create the output she wants. Angry IP Scanner is a separate scanner and does not generate a visual map of networks—instead, it provides lists. Wmap is a plug-in for the Metasploit Framework and a stand-alone tool that is a web application and service vulnerability testing tool, and nmap-gs was made up for this question.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Susan runs an nmap scan using the following command: nmap -O -Pn 192.168.1.0/255

What information will she see about the hosts she scans?

  1. The hostname and service ports

  1. The hostname, service ports, and operating system

  1. The hostname and operating system

  1. The hostname, uptime, and logged-in user

Answer explanation

Along with the time to run the scan and time to live of packets sent, Susan will see the hostname, service ports, and operating system using the scan flags above. The -O flag attempts to identify the operating system, while the -Pn flag skips pinging and scans all hosts in the network on their typically scanned ports.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Tuan wants to gather additional information about a domain that he has entered in Maltego. What functionality is used to perform server-based actions in Maltego?

  1. A worker

  1. A query

  1. A transform

  1. A scan

Answer explanation

Maltego calls its server-based functions for information gathering “transforms.”

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Laura wants to conduct a search for hosts using Recon-ng but wants to leverage a search engine with API access to acquire existing data. What module should she use?

  1. recon/companies-multi/whois_miner

  1. import/nmap

  1. recon/domains-hosts/shodan_hostname

  1. import/list

Answer explanation

While you may not know the full list of Recon-ng plug-ins, Shodan is a well-known search engine. Laura could leverage API access to Shodan to gather information from previously performed searches. Both the import utilities will require her to have data she has already gathered, and the Whois miner can be assumed to use Whois information rather than an existing search engine dataset.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?