Exam 4: Footprinting and Social Engineering
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
What utility can be used to intercept detailed information from a company's Web site?
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
B
Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Which HTTP method requests that the entity is stored under the Request-URI?
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
B
Explain the process of "footprinting," and why it is important to a security professional?
(Essay)
4.7/5
(24)
What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?
(Multiple Choice)
4.8/5
(39)
Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?
(Multiple Choice)
4.9/5
(44)
Match each item with a statement below.
-Server didn't receive a timely response
(Multiple Choice)
4.9/5
(34)
Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection,such as Secure Socket Layer (SSL)?
(Multiple Choice)
5.0/5
(34)
What is the passive process of finding information on a company's network called?
(Multiple Choice)
4.9/5
(26)
What tool can be used to read and write data to ports over a network?
(Multiple Choice)
4.8/5
(28)
Which HTTP error informs you the server understands the request but refuses to comply?
(Multiple Choice)
4.9/5
(32)
What HTTP method is the same as the GET method,but retrieves only the header information of an HTML document,not the document body?
(Multiple Choice)
4.8/5
(41)
The HTTP CONNECT method starts a remote application-layer loopback of the request message.
(True/False)
4.9/5
(33)
Match each item with a statement below.
-Request not made by client in allotted time
(Multiple Choice)
4.8/5
(38)
Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 48
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)