100 Chapter 4 ■ Footprinting and Reconnaissance
- What can be configured in most search engines to monitor and alert you of changes to con-
tent?
A. Notifications
B. Schedules
C. Alerts
D. HTTP - What phase comes after footprinting?
A. System hacking
B. Enumeration
C. Scanning
D. Transfer files - If you can’t gain enough information directly from a target, what is another option?
A. EDGAR
B. Social engineering
C. Scanning
D. Competitive analysis - What is the purpose of social engineering?
A. Gain information from a computer
B. Gain information from the Web
C. Gain information from a job site
D. Gain information from a human being - Which of the following would be effective for social engineering?
A. Social networking
B. Port scanning
C. Websites
D. Job boards - Footprinting can determine all of the following except:
A. Hardware types
B. Software types
C. Business processes
D. Number of personnel