Exam 4: Footprinting and Social Engineering
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
____ is trailing closely behind an employee who has access to an area without the person realizing that you didn't use a PIN or a security badge to enter the area.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
Namedroppers is a tool that can be used to capture Web server information and possible vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.
Free
(True/False)
4.9/5
(28)
Correct Answer:
False
____ means using a knowledge of human nature to get information from people.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
____ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs.
(Multiple Choice)
4.8/5
(39)
MATCHING
Match each term with the correct statement below.
-Server received invalid response from upstream server
(Multiple Choice)
4.7/5
(23)
____ enable you to see all the host computers on a network. In other words, they give you an organization's network diagram.
(Multiple Choice)
4.8/5
(34)
To see additional parameters that can be used with the ____ command, you can type nc -h at the command prompt.
(Multiple Choice)
4.8/5
(34)
With commands such as ____, you can perform zone transfers of all DNS records.
(Multiple Choice)
4.8/5
(36)
MATCHING
Match each term with the correct statement below.
-Unable to match request
(Multiple Choice)
4.9/5
(33)
MATCHING
Match each term with the correct statement below.
-Server understands request but refuses to comply
(Multiple Choice)
4.9/5
(36)
What is the purpose of a Web bug? How do they relate to or differ from spyware?
(Essay)
4.8/5
(38)
____ can be used to gather information useful for computer criminals, like company phone directories, financial reports, interoffice memos, resumes of employees, etc.
(Multiple Choice)
4.9/5
(38)
MATCHING
Match each term with the correct statement below.
-Request could not be fulfilled by server
(Multiple Choice)
4.8/5
(28)
MATCHING
Match each term with the correct statement below.
-Request not allowed for the resource
(Multiple Choice)
4.8/5
(32)
MATCHING
Match each term with the correct statement below.
-Server is unavailable due to maintenance or overload
(Multiple Choice)
4.9/5
(35)
MATCHING
Match each term with the correct statement below.
-Server did not receive a timely response
(Multiple Choice)
4.9/5
(44)
Showing 1 - 20 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)