In: Computer Science
1.
Anonymity is not an important consideration while conducting Cyber
reconnaissance.
True OR False
2.
In the context of Cybersecurity, a Sock Puppet is best described by
which of the following?
A compromised computer used to securely search the internet
during reconnaissance operations.
A cool kids toy made from an old sock.
A type of socks proxy that can be remotely manipulated from a third
party computer.
A fake virtual persona created and used to provide anonymity while
online.
3.
It is not possible to locate a target’s security credentials
(usernames and passwords) on the Internet.
True OR False
4.
Search the CyberApolis Power Company’s website and locate the Net
Electricity Generation 1949 to 2012 report. What user name is
associated with that report’s metadata?
5.
Cyber Reconnaissance has the following which four basic
components?
Scanning, Exploitation, Post Exploitation, and
Persistence.
Selection & Discovery, Resource Extraction & Mining,
Resource.
Correlation & Information Processing, and Attack
Modeling.
Source Selection, Source & Environment Evaluation, Data.
Correlation & Processing, and Source Operations.
None of the above.
6.
Browserspy.dk can be used to breach a victim’s computer and spy on
their web surfing activities.
True OR False
7.
A target's social links and patterns of life can provide insights
into attack vectors that could be effectively used against him or
her.
True OR False
8.
Online People searches can provide which of the following data?
Specific file formats that are exposed to the open
Internet.
Document metadata.
Corporate financial data.
Personal, geographic, and patterns of life data.
9.
Anonymization of one’s activities on the Internet is an easy
task.
True OR False
10.
Sharing information on social media sites does not present a
security risk.
True OR False
ANSWERS
Anonymity is must for Cyber reconnaissance, because in Cyber reconnaissance we get into some organization's site to gather internal information, for this our identity should be hidden from that organization to not get into jail.
2. OPTION D
SOCK PUPPET : A fake virtual persona created and used to provide anonymity while online. They are used to make fake accounts which have some positive use as well as negative use.
positive: can be used by police to get to hackers
negative: creating fake account in fb and using them to do frauds like honey traps.
3. FALSE
There is no way to find target’s security credentials (usernames and passwords) on the Internet, until target itself provide that :) .
4. Energy information administration(EIA)
5. OPTION D
It's correct answer can be OPTION B, if option B was-
o>Selection & Discovery
o>Resource Extraction & Mining
o>Resource verification
but in option b in question contain only (Selection & Discovery, Resource Extraction & Mining, Resource)resource not resource verification, So, option D will be most appropriate.
6. TRUE
browserspy.dk is a website tells us what kind of information taken by our browser.In this process it also used to spy on user web surfing activities.
7. TRUE
Any kind of information of a person in wrongful hands make him/her vulnerable of attacks. Any personal or social information which can be used against you mustn't get leaked anywhere. It should be in your mind only.
8. Specific file formats that are exposed to the open Internet and Document metadata.
For example, If our professor has published some paper on machine learning and they are available online, then we have info about that file and that document metadata. Other two options are very private data and that will be only with person himself/herself.
9. FALSE
This is not easy but a very tricky task. It needs a good amount of knowledge of virtual private networks and proxies. It required knowledge of software like kali Linux, which itself is hard to master.
10. FALSE
Easiest way of gathering information of target is through social media , as we post our sensitive information without knowing that it can be harmful for us. For ex. - If you live in London and you have gone to Dubai for vacation. Now you are posting photos on facebook, any robber can get to know that you are out of your house and they can rob your house easily.