Exam 4: Footprinting and Social Engineering

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is trailing closely behind an employee who has access to an area without the person realizing that you didn't use a PIN or a security badge to enter the area.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

Namedroppers is a tool that can be used to capture Web server information and possible vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.

Free
(True/False)
4.9/5
(28)
Correct Answer:
Verified

False

____ means using a knowledge of human nature to get information from people.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

____ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs.

(Multiple Choice)
4.8/5
(39)

MATCHING Match each term with the correct statement below. -Server received invalid response from upstream server

(Multiple Choice)
4.7/5
(23)

____ enable you to see all the host computers on a network. In other words, they give you an organization's network diagram.

(Multiple Choice)
4.8/5
(34)

To see additional parameters that can be used with the ____ command, you can type nc -h at the command prompt.

(Multiple Choice)
4.8/5
(34)

With commands such as ____, you can perform zone transfers of all DNS records.

(Multiple Choice)
4.8/5
(36)

MATCHING Match each term with the correct statement below. -Unable to match request

(Multiple Choice)
4.9/5
(33)

MATCHING Match each term with the correct statement below. -Server understands request but refuses to comply

(Multiple Choice)
4.9/5
(36)

What is the purpose of a Web bug? How do they relate to or differ from spyware?

(Essay)
4.8/5
(38)

____ can be used to gather information useful for computer criminals, like company phone directories, financial reports, interoffice memos, resumes of employees, etc.

(Multiple Choice)
4.9/5
(38)

The HTTP ____ allows data to be sent to a Web server.

(Multiple Choice)
4.9/5
(36)

How can computer criminals use the Whois utility for their purposes?

(Essay)
4.8/5
(35)

List at least five tools available for footprinting.

(Essay)
4.8/5
(36)

MATCHING Match each term with the correct statement below. -Request could not be fulfilled by server

(Multiple Choice)
4.8/5
(28)

MATCHING Match each term with the correct statement below. -Request not allowed for the resource

(Multiple Choice)
4.8/5
(32)

MATCHING Match each term with the correct statement below. -Server is unavailable due to maintenance or overload

(Multiple Choice)
4.9/5
(35)

MATCHING Match each term with the correct statement below. -Server did not receive a timely response

(Multiple Choice)
4.9/5
(44)

How can DNS be used for footprinting?

(Essay)
4.8/5
(34)
Showing 1 - 20 of 51
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)