Exam 4: Footprinting and Social Engineering

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What utility can be used to intercept detailed information from a company's Web site?

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

B

Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Which HTTP method requests that the entity is stored under the Request-URI?

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

B

What is the HTTP method that retrieves data by URI?

(Multiple Choice)
4.8/5
(28)

Explain the process of "footprinting," and why it is important to a security professional?

(Essay)
4.7/5
(24)

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

(Multiple Choice)
4.8/5
(39)

What type of information is usually gathered by social engineering?

(Essay)
4.9/5
(35)

Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?

(Multiple Choice)
4.9/5
(44)

Match each item with a statement below. -Server didn't receive a timely response

(Multiple Choice)
4.9/5
(34)

Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection,such as Secure Socket Layer (SSL)?

(Multiple Choice)
5.0/5
(34)

What is the passive process of finding information on a company's network called?

(Multiple Choice)
4.9/5
(26)

What tool can be used to read and write data to ports over a network?

(Multiple Choice)
4.8/5
(28)

What is "competitive intelligence"?

(Essay)
4.7/5
(39)

Which HTTP error informs you the server understands the request but refuses to comply?

(Multiple Choice)
4.9/5
(32)

How can DNS be used for footprinting?

(Essay)
4.8/5
(45)

What HTTP method is the same as the GET method,but retrieves only the header information of an HTML document,not the document body?

(Multiple Choice)
4.8/5
(41)

The HTTP CONNECT method starts a remote application-layer loopback of the request message.

(True/False)
4.9/5
(33)

Match each item with a statement below. -Request not made by client in allotted time

(Multiple Choice)
4.8/5
(38)

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

(Multiple Choice)
4.9/5
(38)

How can computer criminals use the Whois utility for their purposes?

(Essay)
4.8/5
(28)
Showing 1 - 20 of 48
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)