Unit 2 - Practice Quiz

INT244

1 What is the primary definition of 'Footprinting' in the context of ethical hacking?

A. The process of creating a backup of a system
B. The technique of gathering information about a target computer system
C. The act of exploiting a vulnerability in a web application
D. The physical tracking of a target user

2 Which of the following best describes 'Passive Footprinting'?

A. Interacting directly with the target system
B. Collecting information without direct interaction with the target
C. Running a denial of service attack
D. Scanning ports on the target server

3 Which of the following is a major threat introduced by footprinting?

A. Automatic installation of malware
B. Social Engineering attacks
C. Immediate hardware failure
D. Slow internet connection

4 In the footprinting process, what is the 'intitle' Google search operator used for?

A. To search for a specific file type
B. To search for a string within the URL
C. To search for pages containing a specific string in the page title
D. To limit results to a specific domain

5 Which Google search operator would a hacker use to find specific file types, such as PDF or XLS, potentially containing sensitive data?

A. site:
B. link:
C. filetype:
D. related:

6 What is the 'Google Hacking Database' (GHDB)?

A. A tool to hack Google servers
B. A repository of search queries (dorks) used to find sensitive data publicly available
C. A database of Google employee passwords
D. A software that blocks Google tracking

7 How can job search sites be used for information gathering?

A. To steal employee bank accounts
B. To identify the technologies and hardware used by the target organization
C. To shut down the company's recruitment portal
D. To modify job descriptions

8 Which financial service database in the US is often used to gather financial information about public companies?

A. EDGAR database
B. NVD database
C. Whois database
D. Exploit-DB

9 What is the primary purpose of 'Scanning' in the hacking methodology?

A. To gather preliminary information from public sources
B. To identify live hosts, open ports, and services on a network
C. To gain administrative access to the system
D. To install a backdoor

10 Which of the following is NOT a typical phase of the scanning methodology?

A. Checking for live systems
B. Checking for open ports
C. Checking for vulnerability
D. Checking for social media profiles

11 Which type of scan is known as a 'Half-open' scan?

A. TCP Connect Scan
B. Stealth / SYN Scan
C. Xmas Scan
D. Null Scan

12 What distinguishes a 'TCP Connect' scan from a 'SYN' scan?

A. TCP Connect requires root privileges
B. TCP Connect completes the full 3-way handshake
C. TCP Connect is more stealthy
D. TCP Connect uses UDP packets

13 In an 'Xmas Scan', which flags are set in the TCP packet?

A. SYN, ACK, RST
B. FIN, URG, PSH
C. SYN only
D. No flags set

14 What is the defining characteristic of a 'Null Scan'?

A. It sends a packet with no flags set
B. It sends a packet with all flags set
C. It sends an empty UDP payload
D. It sends a ping request only

15 Which scan type relies on a 'Zombie' machine to hide the attacker's identity?

A. IDLE Scan
B. TCP Connect Scan
C. UDP Scan
D. Ping Sweep

16 What is the main challenge associated with 'UDP Scanning'?

A. It is too fast
B. It is connection-oriented
C. It is often slow and unreliable because UDP is connectionless
D. It requires authentication

17 What is 'Banner Grabbing'?

A. Stealing physical banners from a company
B. Capturing the welcome message or header sent by a service upon connection
C. Copying the website logo
D. Intercepting Wi-Fi signals

18 What is 'OS Fingerprinting'?

A. Scanning for fingerprints on a laptop
B. Determining the operating system of a target host
C. Finding the owner of the operating system
D. Cracking the OS password

19 Which parameter is commonly analyzed in Passive OS Fingerprinting?

A. Login Username
B. Time to Live (TTL) values
C. CPU Temperature
D. Hard drive serial number

20 What is 'Active OS Fingerprinting'?

A. Sniffing traffic without sending packets
B. Sending specially crafted packets to the target and analyzing the response
C. Asking the admin for the OS version
D. Checking the website HTML source code

21 Which tool is the industry standard for network scanning and OS fingerprinting?

A. Wireshark
B. Nmap
C. John the Ripper
D. Aircrack-ng

22 What is a 'Ping Sweep' used for?

A. To crash a server
B. To identify which IP addresses in a range are live hosts
C. To measure internet speed
D. To clean up temporary files

23 Which of the following is a countermeasure against Google Hacking?

A. Removing the robots.txt file
B. Registering the site with more search engines
C. Ensuring sensitive directories are disallowed in robots.txt and not indexed
D. Using a shorter domain name

24 What is 'Split DNS' used for as a countermeasure?

A. To speed up internet access
B. To hide internal network information from external users
C. To split the internet bill
D. To increase the number of available IP addresses

25 How can an ACK scan help an attacker?

A. It opens a backdoor
B. It determines if the firewall is stateful and which ports are filtered
C. It retrieves the admin password
D. It crashes the system

26 What is 'Vulnerability Scanning'?

A. Scanning for viruses on a USB drive
B. The automated process of identifying known security weaknesses in systems
C. Scanning a document to PDF
D. Monitoring network traffic for speed

27 Which of the following is a common vulnerability scanning tool?

A. Nessus
B. Photoshop
C. Outlook
D. FileZilla

28 What is a 'False Positive' in vulnerability scanning?

A. The scanner fails to find an existing vulnerability
B. The scanner reports a vulnerability that does not actually exist
C. The scanner crashes during the scan
D. The scanner finds a critical vulnerability

29 Why would an attacker use a 'Proxy' during scanning?

A. To speed up the scan
B. To hide their actual IP address and identity
C. To encrypt the target hard drive
D. To bypass antivirus software on their own machine

30 What is 'Proxy Chaining'?

A. Connecting multiple computers with a physical chain
B. Using multiple proxy servers in a sequence to increase anonymity
C. Linking a proxy to a firewall
D. Blocking all proxies

31 What is the 'TOR' network primarily used for in the context of security?

A. Downloading movies faster
B. Hosting websites
C. Providing anonymity by routing traffic through a distributed network of relays
D. Filtering spam emails

32 In the context of the 'Family tree of Scans', which category does a SYN scan belong to?

A. Port Scanning
B. Vulnerability Scanning
C. Network Scanning
D. Social Engineering

33 What information does 'WHOIS' lookup provide?

A. The current GPS location of the server
B. Domain registration details like owner, contact info, and expiry
C. The root password of the server
D. The list of open ports

34 Which Google operator limits the search to a specific domain?

A. host:
B. domain:
C. site:
D. url:

35 What is a potential risk of using public proxies?

A. They are too expensive
B. The proxy owner may sniff/steal the data passing through it
C. They cannot access Google
D. They always block HTTPS traffic

36 Which of the following is a countermeasure against Port Scanning?

A. Disabling the firewall
B. Configuring a firewall to block unsolicited connection attempts
C. Publishing all IP addresses online
D. Using Telnet instead of SSH

37 What does the Google operator 'cache:' do?

A. Deletes the browser cache
B. Displays Google's cached version of a web page
C. Hides the page from Google
D. Speeds up the search

38 Social networking sites are primarily used in which phase of hacking?

A. Gaining Access
B. Footprinting/Reconnaissance
C. Maintaining Access
D. Clearing Tracks

39 What is the purpose of 'archive.org' (Wayback Machine) in footprinting?

A. To hack into government archives
B. To view previous versions of websites to find old info
C. To store stolen data
D. To archive email logs

40 In a 'Full Open' scan, what happens when a port is open?

A. The scanner sends RST immediately
B. The scanner completes the 3-way handshake (SYN, SYN-ACK, ACK)
C. The scanner sends a FIN packet
D. The scanner waits for a timeout

41 Which of the following describes 'Competitive Intelligence' in the context of footprinting?

A. Spying on employees via webcam
B. Gathering publicly available information about competitors
C. Stealing trade secrets via malware
D. Bribing competitor employees

42 What is 'Traceroute' used for in footprinting?

A. To find the physical location of the server
B. To map the network path and routers between the attacker and the target
C. To crack the Wi-Fi password
D. To scan for viruses

43 Which scan is designed to be invisible to legacy logging systems?

A. TCP Connect Scan
B. Stealth Scan
C. Ping Sweep
D. List Scan

44 What is the primary function of an 'Anonymizer'?

A. To delete cookies
B. To mask the user's identity while browsing the web
C. To encrypt emails
D. To scan for malware

45 If a target system responds with an RST packet to a SYN packet, what does it usually mean?

A. The port is open
B. The port is closed
C. The port is filtered
D. The system is offline

46 What is the main benefit of 'Passive' footprinting over 'Active'?

A. It provides more detailed technical info
B. It is faster
C. It avoids alerting the target
D. It allows modifying data

47 Which tool allows you to visualize the path of a packet across the internet geographically?

A. Ping
B. Visual Traceroute
C. Netcat
D. Telnet

48 What is 'DNS Interrogation'?

A. Asking the admin for the DNS password
B. Probing DNS servers to extract DNS records (A, MX, CNAME, etc.)
C. Deleting DNS records
D. Redirecting DNS traffic

49 Which of the following is a countermeasure against OS Fingerprinting?

A. Using the default OS settings
B. Modifying the default TTL values and TCP window sizes
C. Using an open Wi-Fi network
D. Disabling antivirus

50 What is the relationship between Footprinting and Scanning?

A. They are the same thing
B. Scanning precedes Footprinting
C. Footprinting gathers broad info, while Scanning actively probes the identified targets
D. Scanning is passive, Footprinting is active