Chapter 5: Reconnaissance and Intelligence Gathering
Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Adrian Velazquez
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Megan wants to use the Metasploit Framework to conduct a web application vulnerability scan. What module from the following list is best suited to her needs?
smb_login
Angry IP
nmap
wmap
Answer explanation
The wmap scanner is a web application scanner module for the Metasploit Framework that can scan for vulnerable web applications. The smb_login tool looks for SMB shares, not web applications. Angry IP Scanner is not integrated with Metasploit, and nmap is a port scanner, not a full web application vulnerability scanner.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What flag does nmap use to enable operating system identification?
–os
–id
–O
–osscan
Answer explanation
Nmap's operating system identification flag is –O and it enables OS detection. –A also enables OS identification and other features. –osscan with modifiers like –limit and –guess set specific OS identification features. –os and –id are not nmap flags.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What command-line tool can be used to determine the path that traffic takes to a remote system?
Whois
traceroute
nslookup
routeview
Answer explanation
Traceroute (or tracert on Windows systems) is a command-line tool that uses ICMP to trace the route that a packet takes to a host. Whois and nslookup are domain tools, and routeview is not a command-line tool.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Valerie wants to use a graphical interface to control nmap and wants to display her scans as a visual map to help her understand her target networks. What tool from the following list should she use?
Angry IP Scanner
wmap
Zenmap
nmap-gs
Answer explanation
Zenmap is a graphical user interface for nmap that also supports graphical output, including visual maps of networks. Valerie can use Zenmap to control nmap and create the output she wants. Angry IP Scanner is a separate scanner and does not generate a visual map of networks—instead, it provides lists. Wmap is a plug-in for the Metasploit Framework and a stand-alone tool that is a web application and service vulnerability testing tool, and nmap-gs was made up for this question.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Susan runs an nmap scan using the following command: nmap -O -Pn 192.168.1.0/255
What information will she see about the hosts she scans?
The hostname and service ports
The hostname, service ports, and operating system
The hostname and operating system
The hostname, uptime, and logged-in user
Answer explanation
Along with the time to run the scan and time to live of packets sent, Susan will see the hostname, service ports, and operating system using the scan flags above. The -O flag attempts to identify the operating system, while the -Pn flag skips pinging and scans all hosts in the network on their typically scanned ports.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Tuan wants to gather additional information about a domain that he has entered in Maltego. What functionality is used to perform server-based actions in Maltego?
A worker
A query
A transform
A scan
Answer explanation
Maltego calls its server-based functions for information gathering “transforms.”
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Laura wants to conduct a search for hosts using Recon-ng but wants to leverage a search engine with API access to acquire existing data. What module should she use?
recon/companies-multi/whois_miner
import/nmap
recon/domains-hosts/shodan_hostname
import/list
Answer explanation
While you may not know the full list of Recon-ng plug-ins, Shodan is a well-known search engine. Laura could leverage API access to Shodan to gather information from previously performed searches. Both the import utilities will require her to have data she has already gathered, and the Whois miner can be assumed to use Whois information rather than an existing search engine dataset.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
2Week VirtualTraining on Cyber Security for Women Govt Officials
Quiz
•
Professional Development
17 questions
ISC2 - Domain 1- Security Principles
Quiz
•
Professional Development
20 questions
Topic 1 Question 101 to 120
Quiz
•
Professional Development
20 questions
Chapter 3: Malicious Activity
Quiz
•
Professional Development
18 questions
Andres Weekly 0412
Quiz
•
Professional Development
20 questions
SwiftUI Test
Quiz
•
Professional Development
17 questions
MERN Stack (Backend + Frontend Connection)
Quiz
•
Professional Development
15 questions
User Experience and Interface Design Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade