98 Chapter 4 ■ Footprinting and Reconnaissance
Review Questions
- Which of the following best describes footprinting?
A. Enumeration of services
B. Discovery of services
C. Discussion with people
D. Investigation of a target - Which of the following cannot be used during footprinting?
A. Search engines
B. E-mail
C. Port scanning
D. Google hacking - Which of the following is used to increase access to a system?
A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor - Which of the following is the process of exploiting services on a system?
A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor - What is EDGAR used to do?
A. Validate personnel
B. Check financial filings
C. Verify a website
D. Gain technical details - Which of the following is a method of manipulating search results?
A. Archiving
B. Operators
C. Hacking
D. Refining