Search Header Logo

Module 1. Passive Reconnaissance

Authored by Sebastian Zamorano

Computers

Professional Development

Used 22+ times

Module 1. Passive Reconnaissance
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the main types of hat for hackers?

Back hat
White hat
Red hat
Grey hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a module of this course?

Passive Reconnaissance
Exploitation
Post-Exploitation
Attacking

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are types of Reconnaissance? Pick 2

Passive
Internal
Active
Virtual

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following types of information are the scope of Passive Reconnaissance? Pick 2

Internal
Organizational
Network Infrastructure
Vulnerabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is OUTSIDE the scope of Passive Reconnaissance?

IP ranges
Open ports
Employees names
Company location

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a command line tool for Passive Reconnaissance?

nmap
host
dig
whois

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools allows to request contact information about domains?

host
dig
whois
hunter.io

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?