Question

In: Computer Science

1. Anonymity is not an important consideration while conducting Cyber reconnaissance. True OR False 2. In...

1.
Anonymity is not an important consideration while conducting Cyber reconnaissance.

True OR False

2.
In the context of Cybersecurity, a Sock Puppet is best described by which of the following?

A compromised computer used to securely search the internet during reconnaissance operations.
A cool kids toy made from an old sock.
A type of socks proxy that can be remotely manipulated from a third party computer.
A fake virtual persona created and used to provide anonymity while online.

3.
It is not possible to locate a target’s security credentials (usernames and passwords) on the Internet.

True OR False

4.
Search the CyberApolis Power Company’s website and locate the Net Electricity Generation 1949 to 2012 report. What user name is associated with that report’s metadata?

5.
Cyber Reconnaissance has the following which four basic components?

Scanning, Exploitation, Post Exploitation, and Persistence.
Selection & Discovery, Resource Extraction & Mining, Resource.
Correlation & Information Processing, and Attack Modeling.
Source Selection, Source & Environment Evaluation, Data. Correlation & Processing, and Source Operations.
None of the above.

6.
Browserspy.dk can be used to breach a victim’s computer and spy on their web surfing activities.

True OR False

7.
A target's social links and patterns of life can provide insights into attack vectors that could be effectively used against him or her.


True OR False


8.
Online People searches can provide which of the following data?

Specific file formats that are exposed to the open Internet.
Document metadata.
Corporate financial data.
Personal, geographic, and patterns of life data.

9.
Anonymization of one’s activities on the Internet is an easy task.

True OR False


10.
Sharing information on social media sites does not present a security risk.


True OR False

Solutions

Expert Solution

ANSWERS

  1. FALSE.

Anonymity is must for Cyber reconnaissance, because in Cyber reconnaissance we get into some organization's site to gather internal information, for this our identity should be hidden from that organization to not get into jail.

2. OPTION D

SOCK PUPPET : A fake virtual persona created and used to provide anonymity while online. They are used to make fake accounts which have some positive use as well as negative use.

positive: can be used by police to get to hackers

negative: creating fake account in fb and using them to do frauds like honey traps.

3. FALSE

There is no way to find target’s security credentials (usernames and passwords) on the Internet, until target itself provide that :) .

4. Energy information administration(EIA)

5. OPTION D

It's correct answer can be OPTION B, if option B was-

o>Selection & Discovery

o>Resource Extraction & Mining

o>Resource verification

but in option b in question contain only (Selection & Discovery, Resource Extraction & Mining, Resource)resource not resource verification, So, option D will be most appropriate.

6. TRUE

browserspy.dk is a website tells us what kind of information taken by our browser.In this process it also used to spy on user web surfing activities.

   7. TRUE

Any kind of information of a person in wrongful hands make him/her vulnerable of attacks. Any personal or social information which can be used against you mustn't get leaked anywhere. It should be in your mind only.   

8. Specific file formats that are exposed to the open Internet and Document metadata.

For example, If our professor has published some paper on machine learning and they are available online, then we have info about that file and that document metadata. Other two options are very private data and that will be only with person himself/herself.

9. FALSE

This is not easy but a very tricky task. It needs a good amount of knowledge of virtual private networks and proxies. It required knowledge of software like kali Linux, which itself is hard to master.

10. FALSE

Easiest way of gathering information of target is through social media , as we post our sensitive information without knowing that it can be harmful for us. For ex. - If you live in London and you have gone to Dubai for vacation. Now you are posting photos on facebook, any robber can get to know that you are out of your house and they can rob your house easily.


Related Solutions

1. Anonymity is not an important consideration while conducting Cyber reconnaissance. True OR False 2. In...
1. Anonymity is not an important consideration while conducting Cyber reconnaissance. True OR False 2. In the context of Cybersecurity, a Sock Puppet is best described by which of the following? A compromised computer used to securely search the internet during reconnaissance operations. A cool kids toy made from an old sock. A type of socks proxy that can be remotely manipulated from a third party computer. A fake virtual persona created and used to provide anonymity while online. 3....
Question 1 Anonymity is not an important consideration while conducting Cyber reconnaissance. True OR False Question...
Question 1 Anonymity is not an important consideration while conducting Cyber reconnaissance. True OR False Question 2 In the context of Cybersecurity, a Sock Puppet is best described by which of the following? A compromised computer used to securely search the internet during reconnaissance operations. A cool kids toy made from an old sock. A type of socks proxy that can be remotely manipulated from a third party computer. A fake virtual persona created and used to provide anonymity while...
1.While the biceps is contracting, there is no activity in the triceps. True or false 2.As...
1.While the biceps is contracting, there is no activity in the triceps. True or false 2.As contractile strength increases, ____________ muscle motor units become involved in the contraction. More or ess 3.A maximum strength skeletal muscle contraction can be sustained indefinitely. True or false
True or False: Futures are customizable contracts while Forwards are not. True False
True or False: Futures are customizable contracts while Forwards are not. True False
1)True or False: Ambiguity is a type of vagueness True False 2)True or False: When determining...
1)True or False: Ambiguity is a type of vagueness True False 2)True or False: When determining whether a report of an argument should be treated as an argument, it is important to consider the context in which the report is made. True True False 3) True or False: In a V argument with two premises, if one of the premises is false, then the argument is definitely weak True False 4) True or False: A report of an argument can...
true or False 1) wee1 Chinese is a positive regulator of Mpahse. 2) TAU is important...
true or False 1) wee1 Chinese is a positive regulator of Mpahse. 2) TAU is important for binding to Acton to help stabilization.
1. True or False: Disaster Planning is not part of the BCP? 2. True or False:...
1. True or False: Disaster Planning is not part of the BCP? 2. True or False: you still need a BCP or DRP if you have business liability insurance, asset replacement insurance and natural disaster insurance 3. True or False: If a business cannot operate, the BCP assists in bringing the business back to life and operational readiness. 4. True or False: a BIA helps define the scope of the BCP itself. 5. True or False: The purpose of having...
1.Natural selection operates at the population level while evolution operates on individuals. True or False 2....
1.Natural selection operates at the population level while evolution operates on individuals. True or False 2. Because mules (a cross between a horse and a donkey) are sterile, they cannot be considered a species. True or False 3.Transposable elements are DNA sequences that a. can copy themselves into entirely new areas of the chromosomes. b. occur only on the X and Y chromosomes. c. contain numerous point mutations. d. are not coded to produce proteins.
1. True or false. The mass of a closed system cannot change. 2. True or false....
1. True or false. The mass of a closed system cannot change. 2. True or false. Fahrenheit scale cannot be used in thermodynamics relations. 3. True or false. An extensive property can be a function of time and location. 4. True or false. If a system is at steady state, then the density is uniform throughout the system. 5. True or false. All modes of heat transfer between two bodies must occur when the two bodies are in contact. 6....
1) TRUE OR FALSE: Parameters yield populations 2) TRUE OR FALSE: In a study entitled the...
1) TRUE OR FALSE: Parameters yield populations 2) TRUE OR FALSE: In a study entitled the relationship between study time and grades, study time is the predictor variable. 3) TRUE OR FALSE: Only experiments involve direct measurement by the researcher. 4) A response variable is also an outcome variable. 5) Statistical methods that use sample data to make statements about populations are called inferential statistics. 6) The IV is the variable that can be randomly assigned by the researcher.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT