22 Chapter 1 ■ Getting Started with Ethical Hacking
- Which of the following is the purpose of the footprinting process?
A. Entering a system
B. Covering tracks
C. Escalating privileges
D. Gathering information - Which of the following forms are usually malicious?
A. Software applications
B. Scripts
C. Viruses
D. Grayware - What is a self-replicating piece of malware?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit - What is a piece of malware that relies on social engineering?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit - Which of the following best describes what a hacktivist does?
A. Defaces websites
B. Performs social engineering
C. Hacks for political reasons
D. Hacks with basic skills - Which of the following best describes what a suicide hacker does?
A. Hacks with permission
B. Hacks without stealth
C. Hacks without permission
D. Hacks with stealth