Decoded: The Cybersecurity Podcast

Part 2 - CEH v12 Practice Questions: Reconnaissance & Footprinting Fundamentals


Listen Later

Part 2: Reconnaissance & Footprinting (15 Questions)

1. What is the main goal of the reconnaissance phase in ethical hacking?


• A) Exploiting vulnerabilities

• B) Identifying security controls

• C) Gathering target information

• D) Delivering payloads


Answer: C) Gathering target information

Explanation: Reconnaissance involves collecting details like domains, IPs, employee info, and network architecture.

2. Which is an example of passive reconnaissance?


• A) Nmap port scan

• B) Social media monitoring

• C) Phishing attack

• D) SQL injection


Answer: B) Social media monitoring

Explanation: Passive reconnaissance gathers public info without engaging the target, like WHOIS lookups or Google Dorking.

3. Which tool performs WHOIS lookups?


• A) Maltego

• B) nslookup

• C) WHOIS

• D) Nikto


Answer: C) WHOIS

Explanation: WHOIS reveals domain registration, owner details, and DNS info.

4. Which technique extracts sensitive data via search engines?


• A) Google Dorking

• B) DNS Spoofing

• C) Phishing

• D) ARP Poisoning


Answer: A) Google Dorking

Explanation: Google Dorking uses search operators to locate exposed files and misconfigured servers.

5. Which command performs DNS zone transfers?


• A) nslookup

• B) whois

• C) dig

• D) ping


Answer: C) dig

Explanation: The dig command queries DNS records like A, MX, and TXT for zone information.

6. What reconnaissance technique intercepts wireless communications?


• A) Phishing

• B) Wardriving

• C) Social engineering

• D) Footprinting


Answer: B) Wardriving

Explanation: Wardriving involves driving around to locate unsecured Wi-Fi networks.

7. Which tool gathers email addresses linked to a domain?


• A) TheHarvester

• B) Nikto

• C) Nessus

• D) Hydra


Answer: A) TheHarvester

Explanation: TheHarvester collects emails, domains, and employee info via search engines and public sources.

8. What technique identifies a target’s network range and IP structure?


• A) Banner grabbing

• B) Port scanning

• C) Footprinting

• D) Fingerprinting


Answer: C) Footprinting

Explanation: Footprinting maps IP addresses, DNS info, and system configurations.

9. Which tool maps relationships between organizations, social media, and domains?


• A) Maltego

• B) Metasploit

• C) Nikto

• D) sqlmap


Answer: A) Maltego

Explanation: Maltego visualizes connections across networks and social platforms.

10. Which command identifies a domain’s mail server?


• A) ping

• B) traceroute

• C) nslookup

• D) netcat


Answer: C) nslookup

Explanation: nslookup -type=MX [domain] reveals mail server info.

11. Which method uses impersonation or pretexting to gather information?


• A) Passive reconnaissance

• B) Active reconnaissance

• C) Human reconnaissance

• D) Hybrid reconnaissance


Answer: C) Human reconnaissance

Explanation: Human reconnaissance exploits social engineering tactics to extract data.

12. Which tool maps web application attack surfaces?


• A) Burp Suite

• B) Aircrack-ng

• C) Hashcat

• D) Ettercap


Answer: A) Burp Suite

Explanation: Burp Suite identifies web application vulnerabilities.

13. Which technique targets employees with customized attacks?


• A) Whaling

• B) Footprinting

• C) Spear phishing

• D) Dumpster diving


Answer: C) Spear phishing

Explanation: Spear phishing personalizes attacks using gathered employee details.

14. Which reconnaissance type directly interacts with target systems?


• A) Passive reconnaissance

• B) Active reconnaissance

• C) Hybrid reconnaissance

• D) Dynamic reconnaissance


Answer: B) Active reconnaissance

Explanation: Active reconnaissance involves direct engagement like port scanning.

15. Which technique retrieves sensitive data from discarded items?


• A) Baiting

• B) Dumpster diving

• C) Tailgating

• D) Pharming


Answer: B) Dumpster diving

Explanation: Dumpster diving involves searching trash for useful data.

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Crime Junkie by Audiochuck

Crime Junkie

369,043 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

CISSP Cyber Training Podcast - CISSP Training Program by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

CISSP Cyber Training Podcast - CISSP Training Program

32 Listeners