Search Header Logo

CyberRecon04N

Authored by Inkar Shoganova

Other

University

Used 1+ times

CyberRecon04N
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which command is used to track the path packets take to a destination host?

route
ping
netstat
traceroute

Answer explanation

Traceroute maps the route using ICMP or UDP packets.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these are NOT CYBER RECON EXAMPLES?

WHOIS lookup
Google dorking
cracking password with hashcat
Shodan search

Answer explanation

Non-technical actions like reading novels or entertainment are not part of cyber recon.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Reading news articles about a target company is what type of recon? Any attempt of social engineering is what type?

Passive / Active
Active / Passive
Passive / Passive
Active / Active

Answer explanation

Reading = passive; social engineering = active recon.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which tool is used to find domain registration details like registrar and expiry date?

WHOIS

netstat

none of the variants

NSlookup

Answer explanation

WHOIS shows registrar, dates, and name server information.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary purpose of hping3?

Packet crafting and firewall testing
Website crawling
Email phishing
DNS cache poisoning

Answer explanation

hping3 crafts custom packets for firewall testing and network analysis.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The command 'dig example.com' is used for what purpose?

Check DNS records
Scan ports
Trace routes
Check local IP configuration

Answer explanation

DIG fetches DNS records and helps in host enumeration.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In Nmap, what does '-sS' flag indicate?

TCP Connect Scan
SYN Stealth Scan
UDP Scan
OS Detection

Answer explanation

-sS performs a SYN Stealth scan, often faster and less detectable.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?