4.1.8 Practice Questions Flashcards
When a penetration tester starts gathering details about employees, vendors, business processes, and physical security, which phase of testing are they in?
answer
Covering tracks
Gaining access
Reconnaissance
Scanning
Reconnaissance
Explanation
During the reconnaissance phase, you gather information about a company. In addition to technical information, you’ll want to gather details about employees, vendors, business processes, and physical security.
Which of the following elements of penetration testing includes the use of web surfing, social engineering, dumpster diving, and social networking?
answer
Information gathering techniques
Information types
Maintaining access
Permission and documentation
Information gathering techniques
Explanation
During the reconnaissance phase, you gather information by reading a company’s website, getting to know their employees, or dumpster diving.
MinJu, a penetration tester, is testing a client’s security. She notices that every Wednesday, a few employees go to a nearby bar for happy hour. She goes to the bar and starts befriending one of the employees with the intention of learning the employee’s personal information. Which information gathering technique is MinJu using?
answer
Social engineering
Dumpster diving
Social networking
Web surfing
Social engineering
Explanation
Social engineering is an attempt to get to know a company’s employees or vendors. After-work social gatherings can provide important tidbits of information about an employee and about a company, especially its weaknesses.
A penetration tester is trying to extract employee information during the reconnaissance phase. What kinds of data is the tester collecting about the employees?
answer
Geographical information, entry control systems, employee routines, and vendor traffic
Operating systems, applications, security policies, and network mapping
Intellectual property, critical business functions, and management hierarchy
Contact names, phone numbers, email addresses, fax numbers, and addresses
Contact names, phone numbers, email addresses, fax numbers, and addresses
Explanation
During the reconnaissance phase, you gather information about a company. For employee information, the penetration tester collects contact names, phone numbers, email addresses, fax numbers, and addresses for any individuals associated with the target company.
Which of the following is the difference between an ethical hacker and a criminal hacker?
answer
A criminal hacker is all-knowing, but an ethical hacker isn’t.
An ethical hacker is nice, clean, and polite, but a criminal hacker isn’t.
An ethical hacker has permission to hack a system, and a criminal hacker doesn’t have permission.
A criminal hacker is easily detected, but an ethical hacker isn’t.
An ethical hacker has permission to hack a system, and a criminal hacker doesn’t have permission.
Explanation
The difference between an ethical hacker and a criminal hacker is that an ethical hacker always obtains permission to hack a system.
Whois, Nslookup, and ARIN are all examples of:
answer
IoT hacking tools
Network footprinting tools
Google hacking tools
Internet research tools
Network footprinting tools
Explanation
Website and email footprinting can provide details on information flow, operating systems, filenames, and network connections. Whois, nslookup, and ARIN are examples of footprinting tools.
Iggy, a penetration tester, is conducting a black box penetration test. He wants to do reconnaissance by gathering information about ownership, IP addresses, domain name, locations, and server types. Which of the following tools would be most helpful?
answer
ARIN
Nslookup
beSTORM
Whois
Whois
Explanation
Whois is a utility used to gain information about a target network. It can gather information about ownership, IP addresses, domain name, location, server type, and the date the site was created.
What does the Google Search operator allinurl:keywords do?
answer
Displays web sites similar to the one listed.
Shows results in pages that contain the keyword in the title.
Shows results in pages that contain all of the listed keywords.
Displays websites where directory browsing has been enabled.
Shows results in pages that contain all of the listed keywords.
Explanation
allinurl:keywords shows results in pages that contain all of the listed keywords.
index of /keyword displays websites where directory browsing has been enabled.
intitle:keyword shows results in pages that contain the keyword in the title.
related:website displays websites similar to the one listed.
What’s the name of the open-source forensics tool that can be used to pull information from social media postings and find relationships between companies, people, email addresses, and other information?
answer
Echosec
Wayback Machine
Maltego
Google Earth
Maltego
Explanation
Maltego is an open-source forensics tool that can be used to pull information from social media postings and find relationships between companies, people, email addresses, and other information.
Xavier is doing reconnaissance. He is gathering information about a company and its employees by going through their social media content. Xavier is using a tool that pulls information from social media postings that were made using location services. What is the name of this tool?
answer
Wayback Machine
Maltego
Echosec
Google Maps
Echosec
Explanation
Echosec is a tool that can be used to pull information from social media postings that were made using location services.
You are in the reconnaissance phase at the XYZ company. You want to use nmap to scan for open ports and use a parameter to scan the 1,000 most common ports. Which nmap command would you use?
answer
nmap -sV xyzcompany.com
nmap -sA xyzcompany.com
nmap -sT xyzcompany.com
nmap -sS xyzcompany.com
nmap -sS xyzcompany.com
Explanation
-sS TCP SYN port scan (default) scans the 1,000 most common ports.
-sV attempts to determine the version of the service running on port.
-sT TCP connects a port scan (default without root privilege).
-sA executes a TCP ACK port scan.
You have found the IP address of a host to be 172.125.68.30. You want to see what other hosts are available on the network. Which of the following nmap commands would you enter to do a ping sweep?
answer
nmap -sn 172.125.68. 1-255
nmap -sM 172.125.68. 1-255
nmap -sS 172.125.68. 1-255
nmap -sU 172.125.68. 1-255
nmap -sn 172.125.68. 1-255
Explanation
The nmap -sn command is used to disable port scanning. The command nmap -sn 172.125.8. 1-225 will scan a range of ip addresses without listing the ports.
The nmap -sS command is used for a TCP SYN port scan (default).
The nmap -sU command is used for UDP port scans.
The nmap -sM command is used for TCP Maimon port scans.