Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Ethical Hacking
Quiz 4: Footprinting and Social Engineering
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Essay
Explain why a simple process like "dumpster diving" can be so effective when gathering information utilizing social engineering?
Question 22
Essay
How can a computer criminal use HTTP methods before running an exploit on a server?
Question 23
Essay
How can computer criminals use the Whois utility for their purposes?
Question 24
Essay
How can DNS be used for footprinting?
Question 25
Multiple Choice
Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection,such as Secure Socket Layer (SSL) ?
Question 26
Multiple Choice
Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?
Question 27
Multiple Choice
Match each item with a statement below. -Server understands the request but refuses to comply
Question 28
Essay
What type of information is usually gathered by social engineering?
Question 29
Multiple Choice
When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail,what type of attack is being performed?
Question 30
Essay
What is "competitive intelligence"?
Question 31
Multiple Choice
Match each item with a statement below. -Request not understood by server
Question 32
Essay
List at least five tools available for footprinting.
Question 33
Multiple Choice
What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?
Question 34
Multiple Choice
What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?