16.
Which of the following best describes footprinting?
- A.Enumeration of services
- B.Discovery of services
- C.Discussion with people
- D.Investigation of a target
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Footprinting is the gathering of information relating to an intended target. The idea is to gather as much information about the target as possible before starting an attack. |
17.
Which of the following is not typically used during footprinting?
- A.Search engines
- B.Email
- C.Port scanning
- D.Google hacking
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Port scanning is typically reserved for later stages of the attack process. |
18.
Why use Google hacking?
- A.To fine-tune search results
- B.To speed up searches
- C.To target a domain
- D.To look for information about Google
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Google hacking is used to produce more targeted and useful search results than would be possible using normal searches. |
19.
What is the role of social engineering?
- A.To gain information about computers
- B.To gain information about social media
- C.To gain information from human beings
- D.To gain information about posts and cameras
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Social engineering can gain information about computers and other items, but it does so by interacting with people to extract that information. |
20.
What is EDGAR used to do?
- A.Validate personnel
- B.Check financial filings
- C.Verify a website
- D.Gain technical details
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
EDGAR can be used to verify the financial filings of a company. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40