Home
You may like this!
16.
Which of the following best describes footprinting?
  • A.
    Enumeration of services
  • B.
    Discovery of services
  • C.
    Discussion with people
  • D.
    Investigation of a target
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Footprinting is the gathering of information relating to an intended target. The idea is to gather as much information about the target as possible before starting an attack.
Report
Name Email  
17.
Which of the following is not typically used during footprinting?
  • A.
    Search engines
  • B.
    Email
  • C.
    Port scanning
  • D.
    Google hacking
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Port scanning is typically reserved for later stages of the attack process.
Report
Name Email  
18.
Why use Google hacking?
  • A.
    To fine-tune search results
  • B.
    To speed up searches
  • C.
    To target a domain
  • D.
    To look for information about Google
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Google hacking is used to produce more targeted and useful search results than would be possible using normal searches.
Report
Name Email  
19.
What is the role of social engineering?
  • A.
    To gain information about computers
  • B.
    To gain information about social media
  • C.
    To gain information from human beings
  • D.
    To gain information about posts and cameras
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Social engineering can gain information about computers and other items, but it does so by interacting with people to extract that information.
Report
Name Email  
20.
What is EDGAR used to do?
  • A.
    Validate personnel
  • B.
    Check financial filings
  • C.
    Verify a website
  • D.
    Gain technical details
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
EDGAR can be used to verify the financial filings of a company.
Report
Name Email