Analyzing Reconnaissance Threats to Computing and Network Environments Flashcards

1
Q

Reconnaissance Steps

A

Footprinting, Scanning, Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Footprinting

A

First, passive phase in which an attacker gathers general information about a target before an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scanning

A

Active phase that involves using tools to discover info about hosts and services on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enumeration

A

Last, active phase where the attacker tries to map the network as a whole to identify potential targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recon Evasion Techniques

A

Obfuscating packet data, fragmenting data into multiple packets, encrypting traffic, DoS the NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Trace Analysis

A

Traffic analysis where insights are gained from the metadata of captured packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

A

Deceiving people into giving away access or confidential information to unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly