Exam 4: Footprinting and Social Engineering

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List the five techniques used by social engineers in their attempts to gain information from unsuspecting people.

(Essay)
4.8/5
(37)

The HTTP ____ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body.

(Multiple Choice)
4.9/5
(39)

Network attacks often begin by gathering information from a company's Web site.

(True/False)
4.8/5
(36)

The HTTP ____________________ method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL).

(Short Answer)
4.9/5
(37)

As a security tester, should you use social-engineering tactics?

(Essay)
4.8/5
(31)

Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.

(True/False)
4.9/5
(30)

Elaborate on the following statement: "The most difficult job of a security professional is preventing social engineers from getting crucial information from company employees."

(Essay)
5.0/5
(41)

To help prevent ____ attacks, you must educate your users not to type logon names and passwords when someone is standing directly behind them-or even standing nearby.

(Multiple Choice)
5.0/5
(33)

Why is ATM shoulder surfing much easier than computer shoulder surfing?

(Essay)
4.8/5
(39)

MATCHING Match each term with the correct statement below. -Request not made by client in allotted time

(Multiple Choice)
4.7/5
(28)

Some cookies can cause security issues because unscrupulous people might store personal information in cookies that can be used to attack a computer or server.

(True/False)
4.9/5
(43)

The HTTP ____ method retrieves data by URI.

(Multiple Choice)
4.9/5
(38)

A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.

(Short Answer)
4.9/5
(35)

____ is the most basic HTTP method.

(Multiple Choice)
4.7/5
(32)

____ is a tool that is used to gather IP and domain information.

(Multiple Choice)
4.8/5
(24)

____ is a tool that is used to perform DNS zone transfers.

(Multiple Choice)
4.9/5
(25)

MATCHING Match each term with the correct statement below. -Request not understood by server

(Multiple Choice)
4.8/5
(42)

What is "competitive intelligence"?

(Essay)
4.9/5
(28)

The ____________________ utility gives you information on a company's IP addresses and any other domains the company might be part of.

(Short Answer)
4.7/5
(28)

The HTTP CONNECT method starts a remote application-layer loopback of the request message.

(True/False)
4.8/5
(37)
Showing 21 - 40 of 51
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)