Question: Question 1 _______________ is a tool that checks for URL variations that could be used for squatting, like the facebeok.com URLCrazy traceroute goofile glue eye

Question 1

_______________ is a tool that checks for URL variations that could be used for squatting, like the facebeok.com

URLCrazy

traceroute

goofile

glue eye

Question 2

Attackers can also use Google to obtain open source data is called

Google Engineering

Google Dorking

Google Jacking

Google Scraping

Question 3

______________allows hackers and security researchers to discover connections between pieces of publicly available information on the internet. These sources include forum posts, web pages, and records from the whois database.

Trivago

Maltego

Maleficent

Malesploit

Question 4

A ___________________ is a vulnerable machine intentionally placed in a network as bait for attackers.

cloud server

neti pot

honey pot

money pot

Question 5

Several groups have compiled lists of IP addresses that you should never be scan, such as government and military servers, called ______.

inclusion lists

exclusion lists

password lists

doring lists

Question 6

This process of collecting and cataloging information from public sources is called _______________________

OSAI

OSINT

OST

OPT

Question 7

__________________can automatically scan systems and identify any vulnerabilities present.

port scanners

vulnerability scanners

malware scanners

net scanners

Question 8

Attackers have found ways of defeating two-factor authentication using a technique called ______________.

SOS Jacking

SIM jacking

SMS Jacking

SOM Jacking

Question 9

_________________ is an open source tool that contains various scripts to automate the OSINT and vulnerability scanning process.

Investigation

Expedition

Uncover

Discover

Question 10

The website _________________________ keeps track of these leaks and stores a list of email addresses associated with leaked passwords.

https://haveibeenowned.com/

https://haveibeenpwned.com/

https://haveiwaspwned.com/

https://haveibeenpawned.com/

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!