1Which of the following best describes the primary objective of the footprinting phase in penetration testing?
A.To install a backdoor for future access
B.To gain administrative access to the system
C.To gather as much information as possible about the target system or network
D.To launch a Denial of Service (DoS) attack
Correct Answer: To gather as much information as possible about the target system or network
Explanation:
Footprinting is the pre-attack phase where the attacker gathers information (IP ranges, domain names, employee details) to create a blueprint of the target.
Incorrect! Try again.
2What is the key difference between Passive and Active footprinting?
A.Active footprinting uses open-source tools, while passive uses proprietary tools.
B.Passive footprinting involves direct interaction with the target, while active does not.
C.Active footprinting generates log entries on the target system, while passive usually does not.
D.Passive footprinting is illegal, while active is legal.
Correct Answer: Active footprinting generates log entries on the target system, while passive usually does not.
Explanation:
Passive footprinting relies on public information (OSINT) without touching the target's infrastructure. Active footprinting involves direct interaction (like pinging or scanning), which is detectable.
Incorrect! Try again.
3Which of the following is considered an OSINT (Open Source Intelligence) source?
A.Packet sniffing on a local LAN
B.Intercepted internal company emails
C.Configuration files obtained via an exploit
D.Public social media profiles and WHOIS records
Correct Answer: Public social media profiles and WHOIS records
Explanation:
OSINT refers to intelligence gathered from publicly available sources.
Incorrect! Try again.
4In the context of 'Google Hacking', what does the search operator filetype:pdf accomplish?
A.It restricts search results to files with the .pdf extension.
B.It converts HTML pages to PDF.
C.It searches for the text 'pdf' in the URL.
D.It searches for websites hosted on a PDF server.
Correct Answer: It restricts search results to files with the .pdf extension.
Explanation:
The filetype operator is used to filter search results to specific file extensions, often used to find leaked documents.
Incorrect! Try again.
5Which DNS record type would a penetration tester query to identify the mail servers of a target organization?
A.MX Record
B.PTR Record
C.A Record
D.CNAME Record
Correct Answer: MX Record
Explanation:
MX (Mail Exchange) records specify the mail servers responsible for accepting email messages on behalf of a domain.
Incorrect! Try again.
6What is the purpose of the archive.org 'Wayback Machine' in the context of information gathering?
A.To view historical versions of a website to find removed information
B.To conduct SQL injection attacks
C.To crack password hashes
D.To scan for open ports on a server
Correct Answer: To view historical versions of a website to find removed information
Explanation:
The Wayback Machine allows testers to view previous versions of a site, potentially revealing contact info, old staff members, or site structures that have since been removed.
Incorrect! Try again.
7Which tool is specifically designed to visualize relationships between people, groups, and companies using open-source intelligence?
A.Wireshark
B.Metasploit
C.John the Ripper
D.Maltego
Correct Answer: Maltego
Explanation:
Maltego is a data mining tool that renders directed graphs for link analysis, helping visualize relationships in OSINT data.
Incorrect! Try again.
8A penetration tester uses the search engine Shodan. What is Shodan primarily used for?
Shodan is a search engine for Internet-connected devices, often used to find vulnerable servers, webcams, and industrial control systems.
Incorrect! Try again.
9Which of the following activities is an example of Social Engineering?
A.Manipulating an employee into revealing their password via a phone call
B.Performing a buffer overflow attack
C.Scanning a firewall for open ports
D.Cracking a WiFi WPA2 handshake
Correct Answer: Manipulating an employee into revealing their password via a phone call
Explanation:
Social engineering relies on psychological manipulation of people to perform actions or divulging confidential information.
Incorrect! Try again.
10What is Dumpster Diving in the context of physical security vulnerabilities?
A.Hiding malware in the recycle bin
B.Jumping over a physical security turnstile
C.Searching through trash to find discarded sensitive documents
D.Deleting files from the trash bin
Correct Answer: Searching through trash to find discarded sensitive documents
Explanation:
Dumpster diving involves rummaging through waste to find bills, notes, or hardware that can provide intelligence about the target.
Incorrect! Try again.
11Which term describes a social engineering attack where the attacker follows an authorized person through a secure door without using a badge?
A.Phishing
B.Spoofing
C.Whaling
D.Tailgating
Correct Answer: Tailgating
Explanation:
Tailgating (or piggybacking) is physically following an authorized user into a restricted area.
Incorrect! Try again.
12In website information gathering, what file is checked to see which parts of the website the administrator wants to hide from search engine crawlers?
A.config.php
B.sitemap.xml
C.index.html
D.robots.txt
Correct Answer: robots.txt
Explanation:
The robots.txt file instructs web crawlers which directories or pages should not be indexed, often revealing sensitive or private directories to a tester.
Incorrect! Try again.
13Which psychological principle of persuasion (defined by Robert Cialdini) relies on the target's tendency to obey figures such as police officers or executives?
A.Consistency
B.Scarcity
C.Liking
D.Authority
Correct Answer: Authority
Explanation:
The principle of Authority suggests that people are hard-wired to comply with requests from perceived authority figures.
Incorrect! Try again.
14What is Phishing?
A.Sending fraudulent emails to induce individuals to reveal personal information
B.Listening to network traffic
C.Guessing passwords using a dictionary
D.A physical attack on server hardware
Correct Answer: Sending fraudulent emails to induce individuals to reveal personal information
Explanation:
Phishing involves sending deceptive communications (usually email) that appear to come from a reputable source.
Incorrect! Try again.
15Which social engineering technique specifically targets high-profile executives like CEOs or CFOs?
A.Vishing
B.Dumpster Diving
C.Whaling
D.Baiting
Correct Answer: Whaling
Explanation:
Whaling is a specific form of spear phishing aimed at high-value targets (the 'big fish').
Incorrect! Try again.
16What is Vishing?
A.Voice Phishing (using the telephone)
B.Visual Hacking
C.Video Phishing
D.Virtual Phishing
Correct Answer: Voice Phishing (using the telephone)
Explanation:
Vishing stands for Voice Phishing, where attackers use phone systems to steal information.
Incorrect! Try again.
17An attacker drops a USB drive labeled 'Payroll 2024' in the company parking lot, hoping an employee plugs it in. What type of attack is this?
A.Pretexting
B.Baiting
C.Tailgating
D.Quid Pro Quo
Correct Answer: Baiting
Explanation:
Baiting uses physical media (like a USB) and relies on the victim's curiosity or greed to compromise a system.
Incorrect! Try again.
18Which tool is commonly used to harvest email addresses and subdomains from public sources like search engines and PGP servers?
A.Wireshark
B.Aircrack-ng
C.theHarvester
D.Nmap
Correct Answer: theHarvester
Explanation:
theHarvester is a tool designed to gather emails, subdomains, hosts, employee names, open ports, and banners from public sources.
Incorrect! Try again.
19What information does the command nslookup primarily provide?
A.Operating System version
B.MAC addresses of local machines
C.DNS records and IP address mapping
D.List of open ports
Correct Answer: DNS records and IP address mapping
Explanation:
nslookup is a network administration command-line tool for querying the Domain Name System (DNS) to obtain domain name or IP address mapping.
Incorrect! Try again.
20In the context of physical security, what is Shoulder Surfing?
A.Sharing a WiFi connection
B.Looking over a user's shoulder to view passwords or sensitive data
C.Using a ladder to climb over a wall
D.Browsing the internet on someone else's computer
Correct Answer: Looking over a user's shoulder to view passwords or sensitive data
Explanation:
Shoulder surfing is a direct observation technique where the attacker watches the victim enter data.
Incorrect! Try again.
21Which social engineering attack involves creating a fabricated scenario to persuade a victim to release information?
A.Sniffing
B.War Driving
C.Pretexting
D.Port Scanning
Correct Answer: Pretexting
Explanation:
Pretexting involves creating an invented scenario (the pretext) to engage a victim in a manner that increases the chance the victim will divulge information.
Incorrect! Try again.
22What is the primary purpose of Competitive Intelligence gathering in footprinting?
A.To understand the target organization's market position, partners, and technologies
B.To shut down a competitor's website
C.To install ransomware
D.To steal physical assets from a competitor
Correct Answer: To understand the target organization's market position, partners, and technologies
Explanation:
Competitive intelligence involves analyzing a target's business environment, which may reveal tech stacks, employee habits, or partnerships that can be exploited.
Incorrect! Try again.
23When performing website mirroring (e.g., using HTTrack), what is the attacker attempting to do?
A.Download a local copy of the website for offline analysis
B.Inject SQL commands
C.Deface the website
D.Crash the web server
Correct Answer: Download a local copy of the website for offline analysis
Explanation:
Mirroring creates an offline copy of a site, allowing the attacker to analyze directory structures and source code without generating further traffic on the live target.
Incorrect! Try again.
24Which Google Dork operator would you use to find pages specifically containing the phrase 'login' in the URL?
A.site:login
B.inurl:login
C.intext:login
D.filetype:login
Correct Answer: inurl:login
Explanation:
inurl: restricts results to documents containing the specified word in the URL.
Incorrect! Try again.
25What allows an attacker to obtain a complete copy of the DNS database for a domain?
A.DNS Reflection
B.DNS Cache Poisoning
C.DNS Zone Transfer
D.DNS Spoofing
Correct Answer: DNS Zone Transfer
Explanation:
If a DNS server is misconfigured to allow Zone Transfers (AXFR) to unauthorized IPs, an attacker can get a list of all hosts in the domain.
Incorrect! Try again.
26Which of the following is an example of Passive Information Gathering?
A.Browsing the target's LinkedIn employee list
B.Running a port scan with Nmap
C.Attempting default passwords on a login page
D.Injecting XSS payloads
Correct Answer: Browsing the target's LinkedIn employee list
Explanation:
Browsing LinkedIn does not interact with the target's servers or network infrastructure, making it passive.
Incorrect! Try again.
27What is Smishing?
A.Phishing via Smart Mail
B.Phishing via SMTP
C.Phishing via Social Media
D.Phishing via SMS (Text Message)
Correct Answer: Phishing via SMS (Text Message)
Explanation:
Smishing is a security attack in which the user is tricked into downloading a Trojan horse or other malware via a text message (SMS).
Incorrect! Try again.
28In the context of the Human Psyche, 'Scarcity' creates a feeling of:
A.Trust in authority
B.Comfort in following the crowd
C.Urgency due to limited availability
D.Obligation to return a favor
Correct Answer: Urgency due to limited availability
Explanation:
Scarcity implies that an item or opportunity is limited, which pressures the victim to act quickly.
Incorrect! Try again.
29What is the Quid Pro Quo social engineering technique?
A.Threatening the victim
B.Promising a benefit in exchange for information
C.Pretending to be a CEO
D.Looking through trash
Correct Answer: Promising a benefit in exchange for information
Explanation:
Quid Pro Quo means 'something for something'. An attacker might offer a service (like IT support) in exchange for credentials.
Incorrect! Try again.
30Which tool can be used to extract Metadata (EXIF data) from images found on a target's website?
A.Ping
B.ExifTool
C.Traceroute
D.Netcat
Correct Answer: ExifTool
Explanation:
ExifTool is a platform-independent Perl library and command-line application for reading, writing, and editing meta information in image files.
Incorrect! Try again.
31What does the traceroute (or tracert) command help a penetration tester identify?
A.The passwords of users
B.The content of the database
C.The web server software version
D.The path packets take and intermediate routers (network topology)
Correct Answer: The path packets take and intermediate routers (network topology)
Explanation:
Traceroute maps the network path, showing hops (routers) between the source and destination.
Incorrect! Try again.
32What is Lock Picking classified as?
A.A physical security attack
B.A network-based attack
C.A cryptographic attack
D.A social engineering attack
Correct Answer: A physical security attack
Explanation:
Lock picking is the art of unlocking a lock by analyzing and manipulating the components of the lock device without the original key.
Incorrect! Try again.
33Which online database allows users to look up the ownership and contact details of a domain name?
A.DHCP
B.WHOIS
C.NAT
D.ARP
Correct Answer: WHOIS
Explanation:
WHOIS is a query and response protocol that is used for querying databases that store the registered users or assignees of an Internet resource.
Incorrect! Try again.
34What does the acronym OSINT stand for?
A.Open Source Intelligence
B.Operating System Integration
C.Official Security Intelligence
D.Open Source Internal Network Technology
Correct Answer: Open Source Intelligence
Explanation:
OSINT stands for Open Source Intelligence.
Incorrect! Try again.
35A hacker calls a receptionist claiming to be from the IT department and asks for the WiFi password to 'fix the network'. This is an example of:
A.Impersonation
B.Buffer Overflow
C.Dumpster Diving
D.SQL Injection
Correct Answer: Impersonation
Explanation:
Impersonation involves assuming the identity of a legitimate employee or trusted individual to gain access.
Incorrect! Try again.
36Which Google search operator restricts results to a specific domain (e.g., only showing results from example.com)?
A.site:example.com
B.domain:example.com
C.link:example.com
D.host:example.com
Correct Answer: site:example.com
Explanation:
The site: operator limits the search to the specified domain.
Incorrect! Try again.
37Why is Social Media scrubbing (gathering data from Facebook, LinkedIn, Twitter) valuable to a penetration tester?
A.It directly provides root access to servers.
B.It crashes the target's network.
C.It allows for physical access to the building.
D.It helps build a profile of employees for password guessing and social engineering.
Correct Answer: It helps build a profile of employees for password guessing and social engineering.
Explanation:
Personal details (pet names, birthdays, job titles) found on social media are often used in password guessing or crafting convincing phishing emails.
Incorrect! Try again.
38What is the best countermeasure against Dumpster Diving?
A.Encrypting email
B.Using strong passwords
C.Shredding sensitive documents before disposal
D.Installing a firewall
Correct Answer: Shredding sensitive documents before disposal
Explanation:
Physical destruction of documents (shredding/burning) prevents attackers from recovering data from trash.
Incorrect! Try again.
39In the context of Human Vulnerabilities, what does FOMO (Fear Of Missing Out) relate to?
A.Social engineering leveraging Urgency/Scarcity
B.Wireless encryption cracking
C.Physical bypassing of locks
D.Technical exploitations
Correct Answer: Social engineering leveraging Urgency/Scarcity
Explanation:
Attackers exploit the psychological trigger of FOMO (linked to Scarcity) to make victims click malicious links quickly.
Incorrect! Try again.
40What is Piggybacking in physical security?
A.Copying a hard drive.
B.An unauthorized person enters a secure area with the consent/knowledge of an authorized person.
C.Intercepting WiFi signals.
D.Using a brute force attack.
Correct Answer: An unauthorized person enters a secure area with the consent/knowledge of an authorized person.
Explanation:
While often used interchangeably with tailgating, Piggybacking technically implies the authorized person is aware and allows the unauthorized person to enter (e.g., holding the door out of politeness).
Incorrect! Try again.
41Which tool would you use to identify the technologies (CMS, Web Server, Frameworks) used by a website?
A.BuiltWith
B.Calculator
C.Notepad
D.Ping
Correct Answer: BuiltWith
Explanation:
BuiltWith is a website profiler tool that identifies technologies used on a website.
Incorrect! Try again.
42What is the risk of Reverse Image Searching an employee's profile picture?
A.It infects the computer with a virus.
B.It deletes the image from the server.
C.It can reveal other social media profiles using the same image.
D.It changes the employee's password.
Correct Answer: It can reveal other social media profiles using the same image.
Explanation:
Reverse image searching (e.g., via TinEye or Google Images) can find where else an image appears, linking different online identities.
Incorrect! Try again.
43Which DNS record type maps an IP address back to a hostname (Reverse DNS)?
A.NS
B.A
C.MX
D.PTR
Correct Answer: PTR
Explanation:
PTR (Pointer) records are used for reverse DNS lookups (IP to Hostname).
Incorrect! Try again.
44Which of the following describes Insider Threat?
A.A virus downloaded from the internet.
B.An attack originating from outside the firewall.
C.A threat from a disgruntled or compromised employee within the organization.
D.A denial of service attack from a botnet.
Correct Answer: A threat from a disgruntled or compromised employee within the organization.
Explanation:
Insider threats come from individuals who have authorized access to the organization's assets.
Incorrect! Try again.
45What type of information is found in the EDGAR database?
A.Email passwords
B.Financial reports of publicly traded US companies
C.DNS records
D.Criminal records
Correct Answer: Financial reports of publicly traded US companies
Explanation:
EDGAR is the SEC database for corporate financial reports, useful for gathering business intelligence.
Incorrect! Try again.
46The command ping is used primarily to test:
A.The strength of a password
B.The type of web server software
C.The speed of the CPU
D.Reachability of a host on an IP network
Correct Answer: Reachability of a host on an IP network
Explanation:
Ping sends ICMP Echo Request messages to verify if a host is reachable.
Incorrect! Try again.
47Which social engineering tactic relies on the principle of 'Social Proof' (Consensus)?
A.'I will give you a gift card if you help me.'
B.'Do this because the CEO said so.'
C.'This offer expires in 5 minutes.'
D.'Everyone else in the department has already updated their password.'
Correct Answer: 'Everyone else in the department has already updated their password.'
Explanation:
Social Proof is the psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior.
Incorrect! Try again.
48What is RFID Cloning?
A.Copying a biological fingerprint
B.Duplicating an email
C.Cloning a website
D.Copying the data from an RFID badge to a blank card to gain physical access
Correct Answer: Copying the data from an RFID badge to a blank card to gain physical access
Explanation:
RFID cloning involves capturing the radio signal from an access card and writing it to another card.
Incorrect! Try again.
49In the context of footprinting, what is the 'target address range'?
A.The physical distance between the hacker and the server
B.The list of email addresses
C.The range of WiFi signal
D.The set of IP addresses owned or used by the target organization
Correct Answer: The set of IP addresses owned or used by the target organization
Explanation:
Identifying the IP address range (netblock) is a crucial step in defining the scope of the technical assessment.
Incorrect! Try again.
50If a penetration tester finds a document with the extension .xls via Google Dorking, what kind of data are they likely looking at?
A.An executable program
B.An Excel spreadsheet
C.A PDF document
D.A database backup
Correct Answer: An Excel spreadsheet
Explanation:
.xls is the file extension for Microsoft Excel spreadsheets, which often contain sensitive data like financial info or employee lists.