Footprinting and Reconnaissance
SKILLSET
Acquiring intelligence related to maintaining better information security, without penetration testing.
Related Questions
- A certified ethical hacker found a post-it inside the cabinet above the desktop which contained the password. This is a form of what?
- An attacker wants to find a webpage that has a title that contains all of their search keywords. Which of the following queries can they use with google?
- Systematic competitive business intelligence is concerned with the entire organisation as individuals become empowered at different levels.Is this true or false?
- Which of these tools would you use in Windows to start a DNS zone transfer:
- What is a user searching for if they enter the following expression in the Google search box: information | data
- Which tool queries publicly available databases that contain domain name registration contact information?
- Which of the following is an example of passive footprinting?
- Which of these is a website copying tool?
- Traceroute is a tool used in the first phase of hacking. Which of the following is NOT displayed?
- PCMCA refers to Planning, Capture, Management, Analysis and Communication in modelling competitive intelligence.Do you agree that such models should replace ad hoc processes that often spring up in businesses?