In: Computer Science
Question 1
Anonymity is not an important consideration while conducting Cyber
reconnaissance.
True OR False
Question 2
In the context of Cybersecurity, a Sock Puppet is best described by
which of the following?
A compromised computer used to securely search the internet
during reconnaissance operations.
A cool kids toy made from an old sock.
A type of socks proxy that can be remotely manipulated from a third
party computer.
A fake virtual persona created and used to provide anonymity while
online.
Question 3
It is not possible to locate a target’s security credentials
(usernames and passwords) on the Internet.
True OR False
Question 4
Search the CyberApolis Power Company’s website and locate the Net
Electricity Generation 1949 to 2012 report. What user name is
associated with that report’s metadata?
Question 5
Cyber Reconnaissance has the following which four basic
components?
Scanning, Exploitation, Post Exploitation, and
Persistence.
Selection & Discovery, Resource Extraction & Mining,
Resource.
Correlation & Information Processing, and Attack
Modeling.
Source Selection, Source & Environment Evaluation, Data.
Correlation & Processing, and Source Operations.
None of the above.
Question 6
Browserspy.dk can be used to breach a victim’s computer and spy on
their web surfing activities.
True OR False
Question 7
A target's social links and patterns of life can provide insights
into attack vectors that could be effectively used against him or
her.
True OR False
Question 8
Online People searches can provide which of the following data?
Specific file formats that are exposed to the open
Internet.
Document metadata.
Corporate financial data.
Personal, geographic, and patterns of life data.
Question 9
Anonymization of one’s activities on the Internet is an easy
task.
True OR False
Question 10
Sharing information on social media sites does not present a
security risk.
True OR False
1
TRUE
2
A type of socks proxy that can be remotely manipulated from a third party computer.
3
TRUE
4
administrator(but not particularly specified)
5
Scanning, Exploitation, Post Exploitation, and Persistence.
6
TRUE
It's also possible to find out if you have a range of programs installed. These include Adobe Reader, OpenOffice.org, Google Chrome and Microsoft Silverlight. Perhaps even which sites you have visited lately can be detected!
7
True
8
Personal, geographic, and patterns of life data.
9
False
10
False