Exam 4: Footprinting and Social Engineering

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is a tool that is used to gather competitive intelligence from Web sites.

(Multiple Choice)
4.9/5
(41)

A(n) ____ is a 1-pixel x 1-pixel image file referenced in an <IMG> tag, and it usually works with a cookie.

(Multiple Choice)
4.8/5
(27)

A(n) ____________________ is a person skilled at reading what users enter on their keyboards, especially logon names and passwords.

(Short Answer)
4.9/5
(38)

____ is a tool that is used to read and write data to ports over a network.

(Multiple Choice)
4.8/5
(31)

What type of information is usually gathered by social engineering?

(Essay)
4.8/5
(30)

The HTTP ____ method requests that the entity be stored under the Request-URI.

(Multiple Choice)
4.9/5
(31)

How can a computer criminal use HTTP methods before running an exploit on a server?

(Essay)
4.8/5
(34)

The ____ tool can generate a report that can show an attacker how a Web site is structured and lists Web pages that can be investigated for further information.

(Multiple Choice)
4.8/5
(36)

To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.

(True/False)
4.9/5
(34)

In computer jargon, the process of finding information on a company's network is called ____________________.

(Short Answer)
4.7/5
(30)

____ can be used to read PINs entered at ATMs or to detect long-distance authorization codes that callers dial.

(Multiple Choice)
4.9/5
(27)
Showing 41 - 51 of 51
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)