CEH

(Jeff_L) #1

256 Chapter 10 ■ Social Engineering



  1. A security camera picks up someone who doesn’t work at the company following closely
    behind an employee while they enter the building. What type of attack is taking place?
    A. Phishing
    B. Walking
    C. Gate running
    D. Tailgating

  2. What is a vulnerability scan?
    A. A way to find open ports
    B. A way to diagram a network
    C. A proxy attack
    D. A way to automate the discovery of vulnerabilities

  3. A proxy is used to.
    A. Assist in scanning
    B. Perform a scan
    C. Keep a scan hidden
    D. Automate the discovery of vulnerabilities

  4. TOR is intended to.
    A. Hide web browsing
    B. Hide the process of scanning
    C. Automate scanning
    D. Hide the banner on a system

  5. Human beings tend to follow set patterns and behaviors known as.
    A. Human nature
    B. Habits
    C. Primacy
    D. Piggybacking

  6. When talking to a victim, using can make an attack easier.
    A. Eye contact
    B. Keywords
    C. Jargon
    D. Threats

Free download pdf