In: Computer Science
1.
Anonymity is not an important consideration while conducting Cyber
reconnaissance.
True OR False
2.
In the context of Cybersecurity, a Sock Puppet is best described by
which of the following?
A compromised computer
used to securely search the internet during reconnaissance
operations.
A cool kids toy made from an old sock.
A type of socks proxy that can be remotely manipulated from a third
party computer.
A fake virtual persona created and used to provide anonymity while
online.
3.
It is not possible to locate a target’s security credentials
(usernames and passwords) on the Internet.
True OR False
4.
Search the CyberApolis Power Company’s website and locate the Net
Electricity Generation 1949 to 2012 report. What user name is
associated with that report’s metadata?
5.
Cyber Reconnaissance has the following which four basic
components?
Scanning,
Exploitation, Post Exploitation, and Persistence.
Selection & Discovery, Resource Extraction & Mining,
Resource.
Correlation & Information Processing, and Attack
Modeling.
Source Selection, Source & Environment Evaluation, Data.
Correlation & Processing, and Source Operations.
None of the above.
6.
Browserspy.dk can be used to breach a victim’s computer and spy on
their web surfing activities.
True OR False
7.
A target's social links and patterns of life can provide insights
into attack vectors that could be effectively used against him or
her.
True OR False
8.
Online People searches can provide which of the following data?
Specific file formats
that are exposed to the open Internet.
Document metadata.
Corporate financial data.
Personal, geographic, and patterns of life data.
9.
Anonymization of one’s activities on the Internet is an easy
task.
True OR False
10.
Sharing information on social media sites does not present a
security risk.
True OR False
1. Anonymity is not an important consideration while conducting
Cyber reconnaissance.
Answer : False
2.In the context of Cybersecurity, a Sock Puppet is best
described by which of the following?
Answer: A fake virtual persona created and used to provide
anonymity while online.
3.It is not possible to locate a target’s security credentials
(usernames and passwords) on the Internet.
Answer: False
4.Search the CyberApolis Power Company’s website and locate the
Net Electricity Generation 1949 to 2012 report. What user name is
associated with that report’s metadata?
Not Sure about this.
5.Cyber Reconnaissance has the following which four basic
components?
Answer: Source Selection, Source & Environment Evaluation,
Data. Correlation & Processing, and Source Operations.
6.Browserspy.dk can be used to breach a victim’s computer and
spy on their web surfing activities.
Answer: True
7.A target's social links and patterns of life can provide
insights into attack vectors that could be effectively used against
him or her.
Answer: True
8.Online People searches can provide which of the following
data?
Answer: Specific file formats that are exposed to the open
Internet.
9.Anonymization of one’s activities on the Internet is an easy
task.
Answer: False
10.Sharing information on social media sites does not present a
security risk.
Answer: False