Question: Question 1 _______________ is a tool that checks for URL variations that could be used for squatting, like the facebeok.com URLCrazy traceroute goofile glue eye
Question 1
_______________ is a tool that checks for URL variations that could be used for squatting, like the facebeok.com
URLCrazy
traceroute
goofile
glue eye
Question 2
Attackers can also use Google to obtain open source data is called
Google Engineering
Google Dorking
Google Jacking
Google Scraping
Question 3
______________allows hackers and security researchers to discover connections between pieces of publicly available information on the internet. These sources include forum posts, web pages, and records from the whois database.
Trivago
Maltego
Maleficent
Malesploit
Question 4
A ___________________ is a vulnerable machine intentionally placed in a network as bait for attackers.
cloud server
neti pot
honey pot
money pot
Question 5
Several groups have compiled lists of IP addresses that you should never be scan, such as government and military servers, called ______.
inclusion lists
exclusion lists
password lists
doring lists
Question 6
This process of collecting and cataloging information from public sources is called _______________________
OSAI
OSINT
OST
OPT
Question 7
__________________can automatically scan systems and identify any vulnerabilities present.
port scanners
vulnerability scanners
malware scanners
net scanners
Question 8
Attackers have found ways of defeating two-factor authentication using a technique called ______________.
SOS Jacking
SIM jacking
SMS Jacking
SOM Jacking
Question 9
_________________ is an open source tool that contains various scripts to automate the OSINT and vulnerability scanning process.
Investigation
Expedition
Uncover
Discover
Question 10
The website _________________________ keeps track of these leaks and stores a list of email addresses associated with leaked passwords.
https://haveibeenowned.com/
https://haveibeenpwned.com/
https://haveiwaspwned.com/
https://haveibeenpawned.com/
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
