0
0
Cybersecurityknowledge~20 mins

Reconnaissance and information gathering in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Reconnaissance Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Passive Reconnaissance

Which of the following best describes passive reconnaissance in cybersecurity?

AGathering information about a target without directly interacting with their systems.
BActively scanning a target's network to find open ports and services.
CUsing malware to extract data from a target's computer.
DAttempting to exploit vulnerabilities to gain unauthorized access.
Attempts:
2 left
💡 Hint

Think about methods that do not alert the target or involve direct contact.

📋 Factual
intermediate
2:00remaining
Common Tools for Information Gathering

Which tool is commonly used for active network reconnaissance to discover open ports and services?

AWireshark
BNmap
CMaltego
DShodan
Attempts:
2 left
💡 Hint

This tool sends packets to target systems to identify open ports.

🔍 Analysis
advanced
2:00remaining
Analyzing Reconnaissance Techniques

Given the following scenario, which reconnaissance technique is being used?

A hacker collects employee names and emails from a company's public website and social media profiles without sending any network requests to the company's servers.

AExploitation
BSocial engineering
CActive scanning
DPassive reconnaissance
Attempts:
2 left
💡 Hint

Consider if the hacker interacts directly with the company's systems.

Comparison
advanced
2:00remaining
Comparing DNS Enumeration Methods

Which DNS enumeration method involves querying DNS servers to find subdomains and related information?

APacket sniffing
BPort scanning
CZone transfer
DPhishing
Attempts:
2 left
💡 Hint

This method tries to get a full copy of DNS records from a server.

Reasoning
expert
2:00remaining
Evaluating Reconnaissance Impact

Why is reconnaissance considered a critical phase in a cyber attack?

AIt helps attackers gather detailed information to plan effective attacks.
BIt prevents attackers from being detected by security systems.
CIt is used to install malware on the target system.
DIt allows attackers to directly exploit vulnerabilities immediately.
Attempts:
2 left
💡 Hint

Think about the purpose of collecting information before attacking.