K01 - Gathering Information Flashcards

1
Q

What are the two modes Nslookup can be used in? Format (xxx, xxx-xxx)

A

interactive, non-interactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______________ mode allows a user to execute queries back-to-back without typing the entire command for each query.

A

interactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______________ mode involves typing the entire command for each query.

A

non-interactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command queries a DNS (Domain Name System) server for DNS records relating to IP addresses, mail exchanges, and name servers?

A

dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the name of the website using the address 63.147.161.50?

A

goarmy.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IPv4 address is the webpage text-lb.esams.wikimedia.org using?

A

91.198.174.192

Use “dig text-lb.easams.wikimedia.org”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If there are no errors with a dig query, what status will the user see?

A

no error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PFC Tyler is attempting to execute a dig query on a site, but he misspelled the website name and accidentally spelled a non-existent website name instead. What status will PFC Tyler see when he attempts this query? Hint: the domain name queried does not exist

A

nxdomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What query status might a user see if they attempt a dig query on a site that has security settings configured so that zone transfers are not permitted or the zone does not exist at the request authority?

A

refused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SGT Gray wants to verify that the H&S Company printer is able to respond to network connections. The IP address of the printer is 192.168.0.105? What command will SGT Gray execute to perform this task?

A

ping 192.168.0.105

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many times will the remote host 192.168.1.101 be ping’d if the following command is executed? ping -c 6 192.168.1.101

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Target Development includes all of the following EXCEPT:

  • Understanding potential vulnerabilities
  • Obtaining or developing scripts
  • Deliver brief derived from mission analysis
  • Planning execution of exploit
  • Testing in a controlled environment
A

Deliver brief derived from mission analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is possible to exploit a target without gathering any information on the target.

  • True
  • False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT one of the 4 Ds:

  • Deny
  • Degrade
  • Destroy
  • Delay
  • Disrupt
A

Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Some information cannot be found within the IP address alone. Select the group of tools that can used in the information gathering phase:

  • Traceroute, Dig, dnsquery
  • nslookup, traceroute, sing
  • ping, dig, traceroute, nslookup
  • routetrace gid,uplook, ipconfig
A

ping, dig, traceroute, nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A traceroute is a network command that can be run on your computer if you experience routing problems. It traces the “hops” between your computer and the final destination. For each hop, the traceroute will diagnose where the problem is.

  • True
  • False
A

True

17
Q

What is an example of nslookup syntax:

A

nslookup www.comptia.com

18
Q

These __________ packets are sent and all routers involved receives these particular packets. These determine if the information in the packets are able to transfer the data effectively.

  • IGMP
  • Traceroute
  • ICMP
  • IMPC
A

ICMP?

19
Q

When in the Information Gathering/Reconnaissance phase, an attacker should gather the least amount of data possible so they can reduce the number of attack vectors, which will reduce the probability of being detected.

  • True
  • False
A

False

20
Q

The ____________ is a series of steps that trace stages of a cyber attack from the early reconnaissance stages to exfiltration. Understanding this process can help users understand and combat ransomware, security breaches, and advanced persistent attacks (APTs)

A

cyber kill chain

21
Q

What specifies the number of pings?

  • -#
  • -c
  • -C
  • -p
A

-c

22
Q

When using the dig command, you may see multiple IP’s from your query. This could be an indication that a __________ may be present?

A

load balancer

23
Q

SSG Thomas needs to see the gateways that packets pass through to reach the destination amazon.com. What command can SSG Thomas use to see this?

A

traceroute www.amazon.com

24
Q

What phase of the Cyber kill chain would be considered the most important phase? This would be paramount to successfully continue all the other phases.

A

reconnaissance

25
Q

___________ is built into both Windows and UNIX operating systems, and is a universal way of testing network response time and performance.

A

ping command

26
Q

What is it called when an attacker probes for weakness including harvesting login credentials or information that is useful in phishing attacks?

  • Weaponization
  • Reconnaissance
  • Spam
  • Installation of Malware
A

Reconnaissance

27
Q

This type of exploitation is taking advantage of a system’s setting that allows it to be manipulated by an unintended source.

A

misconfiguration

28
Q

This type of exploitation is taking advantage of poor OPSEC, cyber training, or restrictions in place.

A

human

29
Q

What command queries DNS servers for relating information such as name servers, mail exchanges and IP addresses.

  • traceroute command
  • dig command
  • ipcontrig command
  • DIIG command
A

dig command

30
Q

What is an example of the a Cyber Kill Chain?

  • a group of botnets
  • a planned process of cyberattack
  • a series of worms based on the same core code
  • a combination of virus, worm, and Trojan Horse
A

a planned process of cyberattack