Deck 1: Applying Environmental Reconnaissance

ملء الشاشة (f)
exit full mode
سؤال
___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is not a common use of an automated email harvesting tool?

A) Discover the address of specific titles of individuals, such as the CEO of a company
B) Verify the email address of an individual user
C) Send email under false pretenses to solicit information from a selected victim
D) Find the email addresses for a list of employees
سؤال
Which of the following is not a principle that is exploited in social engineering?

A) Intimidation
B) Scarcity
C) Desperation
D) Urgency
سؤال
Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.
سؤال
What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
سؤال
Which of the following is not one of the recognized pairs of network types?

A) Wireless vs. wired
B) Static vs. dynamic
C) Virtual vs. physical
D) Internal vs. external
سؤال
______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.
سؤال
Which of the following is a networking program that tests whether a particular host can be reached?

A) ifconfig
B) tracert
C) ping
D) nslookup
سؤال
The name of the ______________ tool is an abbreviation for "network mapper."
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Applying Environmental Reconnaissance
1
___________________ is the process of gathering information about a person from one or more social media sites to construct a "sketch" of that person.
Social media profiling
2
Which of the following is not a common use of an automated email harvesting tool?

A) Discover the address of specific titles of individuals, such as the CEO of a company
B) Verify the email address of an individual user
C) Send email under false pretenses to solicit information from a selected victim
D) Find the email addresses for a list of employees
Send email under false pretenses to solicit information from a selected victim
3
Which of the following is not a principle that is exploited in social engineering?

A) Intimidation
B) Scarcity
C) Desperation
D) Urgency
Desperation
4
Topology discovery is an attempt to uncover the layout of an internal network, which is a key goal of a threat actor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the term for sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is not one of the recognized pairs of network types?

A) Wireless vs. wired
B) Static vs. dynamic
C) Virtual vs. physical
D) Internal vs. external
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
7
______________ is a generic term for a range of products that look for different vulnerabilities in networks or systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a networking program that tests whether a particular host can be reached?

A) ifconfig
B) tracert
C) ping
D) nslookup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
9
The name of the ______________ tool is an abbreviation for "network mapper."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 9 في هذه المجموعة.