Search Skills Flashcards

1
Q

What do we consider when evaluating information ?

A

Source, Evidence & Reasoning, Objectivity & Bias, Corroboration & Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name of Fraudulent Cryptographic method or product ?

A

Snake Oil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the command replacing netstat in Linux systems?

A

Socket Statistics or SS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name Google search operators and their functions

A
  1. ” “ exact phrase
  2. site: restrict to a domain
    • exclude a phrase
  3. filetype: on google has : pdf, xls, doc, ppt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are different specific search engines ?

A

Shodan, Censys, VirusTotal, Have i been pwned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Shodan let us do ?

A

search for specific server types and versions, networking equipment, industrial control systems, IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Censys let us do ?

A

Search for internet-connected hosts, certificates, websites, assets. Used for domain enumeration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does HIBP mean and what does it do ?

A

Have i been pawned , shows if an email address was compromised after a data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the top country with lighttpd servers?

A

United states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does CVE stand for ?

A

Common vulnerability and exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit Database does what ?

A

Gives us exploit codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly