Search Header Logo

Understanding Recon and Google Hacking

Authored by Gerry Wartenberg

Computers

11th Grade

Used 2+ times

Understanding Recon and Google Hacking
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is Google hacking also known as?

Google Searching

Google Exploring

Google Dorking

Google Browsing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is Google hacking always illegal?

Yes, always

No, not when done passively

Only on Tuesdays

Yes, but only on weekends

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the first step a hacker takes when deciding to hack a target?

Sending an email

Visiting the target

Calling the target

Reconnaissance

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of recon involves gathering publicly available information?

Passive recon

Silent recon

Loud recon

Active recon

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Google search operator is used to narrow down searches to a specific site?

inText

site

fileType

inURL

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What can be a potential use of finding publicly available PDFs on a company's website?

Finding recipes

Downloading wallpapers

Learning about company events

Gathering confidential information

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the term used for gathering information about a target?

Hacking

Phishing

Footprinting

Spoofing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?