Home
You may like this!
111.
Which of the following can be used to tweak or fine-tune search results?
  • A.
    Archiving
  • B.
    Operators
  • C.
    Hacking
  • D.
    Refining
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Operators such as filetype are used to manipulate search results for some search engines such as Google.
Report
Name Email  
112.
Which of the following can an attacker use to determine the technology and structure within an organization?
  • A.
    Job boards
  • B.
    Archives
  • C.
    Google hacking
  • D.
    Social engineering
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Job boards are useful in getting an idea of the technology within an organization. By looking at job requirements, you can get a good idea of the technology present. While the other options here may provide technical data, job boards tend to have the best chance of providing it..
Report
Name Email  
113.
Which of the following can be used to assess physical security?
  • A.
    Web cams
  • B.
    Satellite photos
  • C.
    Street views
  • D.
    Interviews
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Street-level views using technology such as Google Street View can give you a picture of what types of security and access points may be present in a location.
Report
Name Email  
114.
Which of the following can help you determine business processes of your target through human interaction?
  • A.
    Social engineering
  • B.
    Email
  • C.
    Website
  • D.
    Job boards
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Social engineering can reveal how a company works.
Report
Name Email  
115.
The Wayback Machine is used to do which of the following?
  • A.
    Get job postings
  • B.
    View websites
  • C.
    View archived versions of websites
  • D.
    Back up copies of websites
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The Wayback Machine is used to view archived versions of websites if available (not all websites are archived via the Wayback Machine).
Report
Name Email