What is the likely first step a potential attacker takes before deciding to target an organization?
Footprinting is the process of researching a potential target before carrying out an attack. Which of the following is not true regarding footprinting?
Which of these is a legal method to obtain information about a company's technologies?
Which of these is not a tool used to perform footprinting?
What two utilities can be used to perform zone transfers?
Which of these is not a typical goal of social engineering?
Which of these is not a tactic used in social engineering?
What is the biggest security threat facing organizations?
Which of these isn't a technique used in social engineering attacks?
What system can be exploited to allow an attacker to perform a zone transfer?
Reading what someone enters on a keyboard like a log-on name, password, or PIN is known as:
Obtaining information from a victim's trash is referred to as:
Which of these is not an effective way to prevent shoulder surfing?
Which of these methods are used by a company to permanently erase data from magnetic hard drives?
This method doesn't apply to flash-based storage devices such as SSDs and flash drives.
Following closely behind employees as they enter a restricted area with the intention of bypassing physical security measures is referred to as: