CEH

(Jeff_L) #1

100 Chapter 4 ■ Footprinting and Reconnaissance



  1. What can be configured in most search engines to monitor and alert you of changes to con-
    tent?
    A. Notifications
    B. Schedules
    C. Alerts
    D. HTTP

  2. What phase comes after footprinting?
    A. System hacking
    B. Enumeration
    C. Scanning
    D. Transfer files

  3. If you can’t gain enough information directly from a target, what is another option?
    A. EDGAR
    B. Social engineering
    C. Scanning
    D. Competitive analysis

  4. What is the purpose of social engineering?
    A. Gain information from a computer
    B. Gain information from the Web
    C. Gain information from a job site
    D. Gain information from a human being

  5. Which of the following would be effective for social engineering?
    A. Social networking
    B. Port scanning
    C. Websites
    D. Job boards

  6. Footprinting can determine all of the following except:
    A. Hardware types
    B. Software types
    C. Business processes
    D. Number of personnel

Free download pdf