CEH

(Jeff_L) #1

98 Chapter 4 ■ Footprinting and Reconnaissance


Review Questions



  1. Which of the following best describes footprinting?
    A. Enumeration of services
    B. Discovery of services
    C. Discussion with people
    D. Investigation of a target

  2. Which of the following cannot be used during footprinting?
    A. Search engines
    B. E-mail
    C. Port scanning
    D. Google hacking

  3. Which of the following is used to increase access to a system?
    A. System hacking
    B. Privilege escalation
    C. Enumeration
    D. Backdoor

  4. Which of the following is the process of exploiting services on a system?
    A. System hacking
    B. Privilege escalation
    C. Enumeration
    D. Backdoor

  5. What is EDGAR used to do?
    A. Validate personnel
    B. Check financial filings
    C. Verify a website
    D. Gain technical details

  6. Which of the following is a method of manipulating search results?
    A. Archiving
    B. Operators
    C. Hacking
    D. Refining

Free download pdf