Exam 4: Footprinting and Social Engineering
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
List the five techniques used by social engineers in their attempts to gain information from unsuspecting people.
(Essay)
4.8/5
(37)
The HTTP ____ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body.
(Multiple Choice)
4.9/5
(39)
Network attacks often begin by gathering information from a company's Web site.
(True/False)
4.8/5
(36)
The HTTP ____________________ method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL).
(Short Answer)
4.9/5
(37)
Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.
(True/False)
4.9/5
(30)
Elaborate on the following statement: "The most difficult job of a security professional is preventing social engineers from getting crucial information from company employees."
(Essay)
5.0/5
(41)
To help prevent ____ attacks, you must educate your users not to type logon names and passwords when someone is standing directly behind them-or even standing nearby.
(Multiple Choice)
5.0/5
(33)
Why is ATM shoulder surfing much easier than computer shoulder surfing?
(Essay)
4.8/5
(39)
MATCHING
Match each term with the correct statement below.
-Request not made by client in allotted time
(Multiple Choice)
4.7/5
(28)
Some cookies can cause security issues because unscrupulous people might store personal information in cookies that can be used to attack a computer or server.
(True/False)
4.9/5
(43)
A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.
(Short Answer)
4.9/5
(35)
____ is a tool that is used to gather IP and domain information.
(Multiple Choice)
4.8/5
(24)
MATCHING
Match each term with the correct statement below.
-Request not understood by server
(Multiple Choice)
4.8/5
(42)
The ____________________ utility gives you information on a company's IP addresses and any other domains the company might be part of.
(Short Answer)
4.7/5
(28)
The HTTP CONNECT method starts a remote application-layer loopback of the request message.
(True/False)
4.8/5
(37)
Showing 21 - 40 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)