Lesson 3:Reconnaissance and Intelligence Gathering Flashcards

1
Q

The process of attempting to contact each network port on the target system and see which ones are open is called as

A

port scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are 1,024 well-known ports that are

A

usually associated with specific services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Metasploit framework is a very powerful tool that can be used by cybercriminals as well as ethical hackers to

A

probe systematic vulnerabilities on networks and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Syslog is a protocol used to send

A

system log or event messages to a specific server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

netstat

A

A command-line tool for monitoring network connections both incoming and outgoing as well as viewing routing tables, interface statistics, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access control list (ACL)

A

A list that specifies which users or system processes have access to a specific object, such as an application or a process, in addition to what operations users can perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whois

A

provides information about a domain’s registrar and physical location. This information includes an organization’s physical address, registrar, contact information, and other details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netflow

A

A Cisco network protocol that collects IP traffic information, allowing network traffic monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

passive fingerprinting

A

A type of fingerprinting that relies on logs and other existing data, which may not provide information needed to fully identify targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

nmap

A

A command-line port scanner that provides a broad range of capabilities, such as multiple scan modes, intended to bypass firewalls and other network protection devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

operating system (OS) fingerprinting

A

The ability to identify an operating system based on network traffic that it sends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

active reconnaissance

A

A type of computer attack that uses host scanning tools to gather information about systems, services, and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

According to Cisco log levels, level 4 represents

A

a warning. The example for warning is a configuration change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A scanning technique, like Transmission Control Protocol synchronize (TCP SYN), is the most popular scan method because it

A

uses a TCP SYN packet to verify a service response. TCP SYN is quick and unobtrusive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nmap’s operating system identification flag is

A

–o and it enables the operating system (OS) detection.

–A also enables OS identification and other features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain Name System (DNS) zone transfers provide a method to replicate DNS information between DNS servers but they are also a

A

tempting target for attackers due to the amount of information that they contain.

17
Q

A heuristic analysis is used to detect threats based on

A

their behavior instead of looking for a specific package.

18
Q

The axfr flag indicates

A

a zone transfer in the dig utilities

19
Q

IANA manages

A

the global IP address space and also manages the Domain Name System (DNS) Root Zone,

20
Q

The Internet Archive helps a user to find

A

an older copy of their website. It maintains copies from across the Internet and is used to review the historical content of a site.

21
Q

Log level 0 is the most critical level because

A

it is used for emergencies in Cisco’s logging level scheme.

22
Q

Microsoft Windows security log can capture

A

login events, resources, and rights usage, and events like open, creation, and deletion of a file.

23
Q

Metadata scrubbing removes hidden content about a document, such as

A

a creator, creation time, system used to create the file, and a host of other information.

24
Q

Exif often includes location and camera data, allowing

A

images to be mapped and identified to a specific device or a type of camera.