Unit 2 - Practice Quiz

INT244 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary definition of 'Footprinting' in the context of ethical hacking?

A. The technique of gathering information about a target computer system
B. The act of exploiting a vulnerability in a web application
C. The process of creating a backup of a system
D. The physical tracking of a target user

2 Which of the following best describes 'Passive Footprinting'?

A. Running a denial of service attack
B. Interacting directly with the target system
C. Collecting information without direct interaction with the target
D. Scanning ports on the target server

3 Which of the following is a major threat introduced by footprinting?

A. Automatic installation of malware
B. Slow internet connection
C. Social Engineering attacks
D. Immediate hardware failure

4 In the footprinting process, what is the 'intitle' Google search operator used for?

A. To search for a string within the URL
B. To limit results to a specific domain
C. To search for a specific file type
D. To search for pages containing a specific string in the page title

5 Which Google search operator would a hacker use to find specific file types, such as PDF or XLS, potentially containing sensitive data?

A. site:
B. related:
C. filetype:
D. link:

6 What is the 'Google Hacking Database' (GHDB)?

A. A software that blocks Google tracking
B. A repository of search queries (dorks) used to find sensitive data publicly available
C. A database of Google employee passwords
D. A tool to hack Google servers

7 How can job search sites be used for information gathering?

A. To steal employee bank accounts
B. To modify job descriptions
C. To shut down the company's recruitment portal
D. To identify the technologies and hardware used by the target organization

8 Which financial service database in the US is often used to gather financial information about public companies?

A. EDGAR database
B. Exploit-DB
C. NVD database
D. Whois database

9 What is the primary purpose of 'Scanning' in the hacking methodology?

A. To identify live hosts, open ports, and services on a network
B. To install a backdoor
C. To gather preliminary information from public sources
D. To gain administrative access to the system

10 Which of the following is NOT a typical phase of the scanning methodology?

A. Checking for open ports
B. Checking for vulnerability
C. Checking for live systems
D. Checking for social media profiles

11 Which type of scan is known as a 'Half-open' scan?

A. Null Scan
B. Stealth / SYN Scan
C. TCP Connect Scan
D. Xmas Scan

12 What distinguishes a 'TCP Connect' scan from a 'SYN' scan?

A. TCP Connect completes the full 3-way handshake
B. TCP Connect requires root privileges
C. TCP Connect is more stealthy
D. TCP Connect uses UDP packets

13 In an 'Xmas Scan', which flags are set in the TCP packet?

A. No flags set
B. FIN, URG, PSH
C. SYN, ACK, RST
D. SYN only

14 What is the defining characteristic of a 'Null Scan'?

A. It sends a packet with all flags set
B. It sends a packet with no flags set
C. It sends an empty UDP payload
D. It sends a ping request only

15 Which scan type relies on a 'Zombie' machine to hide the attacker's identity?

A. Ping Sweep
B. TCP Connect Scan
C. IDLE Scan
D. UDP Scan

16 What is the main challenge associated with 'UDP Scanning'?

A. It requires authentication
B. It is too fast
C. It is often slow and unreliable because UDP is connectionless
D. It is connection-oriented

17 What is 'Banner Grabbing'?

A. Capturing the welcome message or header sent by a service upon connection
B. Copying the website logo
C. Intercepting Wi-Fi signals
D. Stealing physical banners from a company

18 What is 'OS Fingerprinting'?

A. Scanning for fingerprints on a laptop
B. Cracking the OS password
C. Determining the operating system of a target host
D. Finding the owner of the operating system

19 Which parameter is commonly analyzed in Passive OS Fingerprinting?

A. Login Username
B. CPU Temperature
C. Time to Live (TTL) values
D. Hard drive serial number

20 What is 'Active OS Fingerprinting'?

A. Sniffing traffic without sending packets
B. Asking the admin for the OS version
C. Checking the website HTML source code
D. Sending specially crafted packets to the target and analyzing the response

21 Which tool is the industry standard for network scanning and OS fingerprinting?

A. Nmap
B. Aircrack-ng
C. Wireshark
D. John the Ripper

22 What is a 'Ping Sweep' used for?

A. To identify which IP addresses in a range are live hosts
B. To clean up temporary files
C. To measure internet speed
D. To crash a server

23 Which of the following is a countermeasure against Google Hacking?

A. Using a shorter domain name
B. Ensuring sensitive directories are disallowed in robots.txt and not indexed
C. Registering the site with more search engines
D. Removing the robots.txt file

24 What is 'Split DNS' used for as a countermeasure?

A. To hide internal network information from external users
B. To split the internet bill
C. To speed up internet access
D. To increase the number of available IP addresses

25 How can an ACK scan help an attacker?

A. It retrieves the admin password
B. It opens a backdoor
C. It determines if the firewall is stateful and which ports are filtered
D. It crashes the system

26 What is 'Vulnerability Scanning'?

A. Scanning for viruses on a USB drive
B. Monitoring network traffic for speed
C. Scanning a document to PDF
D. The automated process of identifying known security weaknesses in systems

27 Which of the following is a common vulnerability scanning tool?

A. FileZilla
B. Outlook
C. Nessus
D. Photoshop

28 What is a 'False Positive' in vulnerability scanning?

A. The scanner fails to find an existing vulnerability
B. The scanner reports a vulnerability that does not actually exist
C. The scanner crashes during the scan
D. The scanner finds a critical vulnerability

29 Why would an attacker use a 'Proxy' during scanning?

A. To encrypt the target hard drive
B. To hide their actual IP address and identity
C. To bypass antivirus software on their own machine
D. To speed up the scan

30 What is 'Proxy Chaining'?

A. Connecting multiple computers with a physical chain
B. Using multiple proxy servers in a sequence to increase anonymity
C. Blocking all proxies
D. Linking a proxy to a firewall

31 What is the 'TOR' network primarily used for in the context of security?

A. Providing anonymity by routing traffic through a distributed network of relays
B. Hosting websites
C. Filtering spam emails
D. Downloading movies faster

32 In the context of the 'Family tree of Scans', which category does a SYN scan belong to?

A. Social Engineering
B. Port Scanning
C. Vulnerability Scanning
D. Network Scanning

33 What information does 'WHOIS' lookup provide?

A. Domain registration details like owner, contact info, and expiry
B. The root password of the server
C. The list of open ports
D. The current GPS location of the server

34 Which Google operator limits the search to a specific domain?

A. domain:
B. site:
C. host:
D. url:

35 What is a potential risk of using public proxies?

A. They always block HTTPS traffic
B. The proxy owner may sniff/steal the data passing through it
C. They cannot access Google
D. They are too expensive

36 Which of the following is a countermeasure against Port Scanning?

A. Disabling the firewall
B. Publishing all IP addresses online
C. Configuring a firewall to block unsolicited connection attempts
D. Using Telnet instead of SSH

37 What does the Google operator 'cache:' do?

A. Hides the page from Google
B. Speeds up the search
C. Deletes the browser cache
D. Displays Google's cached version of a web page

38 Social networking sites are primarily used in which phase of hacking?

A. Maintaining Access
B. Footprinting/Reconnaissance
C. Clearing Tracks
D. Gaining Access

39 What is the purpose of 'archive.org' (Wayback Machine) in footprinting?

A. To store stolen data
B. To hack into government archives
C. To view previous versions of websites to find old info
D. To archive email logs

40 In a 'Full Open' scan, what happens when a port is open?

A. The scanner completes the 3-way handshake (SYN, SYN-ACK, ACK)
B. The scanner sends RST immediately
C. The scanner waits for a timeout
D. The scanner sends a FIN packet

41 Which of the following describes 'Competitive Intelligence' in the context of footprinting?

A. Gathering publicly available information about competitors
B. Stealing trade secrets via malware
C. Bribing competitor employees
D. Spying on employees via webcam

42 What is 'Traceroute' used for in footprinting?

A. To map the network path and routers between the attacker and the target
B. To find the physical location of the server
C. To crack the Wi-Fi password
D. To scan for viruses

43 Which scan is designed to be invisible to legacy logging systems?

A. TCP Connect Scan
B. Ping Sweep
C. List Scan
D. Stealth Scan

44 What is the primary function of an 'Anonymizer'?

A. To mask the user's identity while browsing the web
B. To delete cookies
C. To scan for malware
D. To encrypt emails

45 If a target system responds with an RST packet to a SYN packet, what does it usually mean?

A. The system is offline
B. The port is closed
C. The port is open
D. The port is filtered

46 What is the main benefit of 'Passive' footprinting over 'Active'?

A. It provides more detailed technical info
B. It is faster
C. It avoids alerting the target
D. It allows modifying data

47 Which tool allows you to visualize the path of a packet across the internet geographically?

A. Telnet
B. Netcat
C. Visual Traceroute
D. Ping

48 What is 'DNS Interrogation'?

A. Asking the admin for the DNS password
B. Probing DNS servers to extract DNS records (A, MX, CNAME, etc.)
C. Redirecting DNS traffic
D. Deleting DNS records

49 Which of the following is a countermeasure against OS Fingerprinting?

A. Using the default OS settings
B. Disabling antivirus
C. Modifying the default TTL values and TCP window sizes
D. Using an open Wi-Fi network

50 What is the relationship between Footprinting and Scanning?

A. Scanning is passive, Footprinting is active
B. They are the same thing
C. Scanning precedes Footprinting
D. Footprinting gathers broad info, while Scanning actively probes the identified targets