1. Which of the following best describes footprinting?
- A) Enumeration of services
 - B) Discovery of services
 - C) Discussion with people
 - D) Investigation of a target
 
Show Answer
2. Which of the following is not typically used during footprinting?
- A) Search engines
 - B) Email
 - C) Port scanning
 - D) Google hacking
 
Show Answer
3. Why use Google hacking?
- A) To fine-tune search results
 - B) To speed up searches
 - C) To target a domain
 - D) To look for information about Google
 
Show Answer
4. What is the role of social engineering?
- A) To gain information about computers
 - B) To gain information about social media
 - C) To gain information from human beings
 - D) To gain information about posts and cameras
 
Show Answer
5. What is EDGAR used to do?
- A) Validate personnel
 - B) Check financial filings
 - C) Verify a website
 - D) Gain technical details
 
Show Answer
6. Which of the following can be used to tweak or fine-tune search results?
- A) Archiving
 - B) Operators
 - C) Hacking
 - D) Refining
 
Show Answer
7. Which of the following can an attacker use to determine the technology and structure within an organization?
- A) Job boards
 - B) Archives
 - C) Google hacking
 - D) Social engineering
 
Show Answer
8. Which of the following can be used to assess physical security?
- A) Web cams
 - B) Satellite photos
 - C) Street views
 - D) Interviews
 
Show Answer
9. Which of the following can help you determine business processes of your target through human interaction?
- A) Social engineering
 - B) Email
 - C) Website
 - D) Job boards
 
Show Answer
10. The Wayback Machine is used to do which of the following?
- A) Get job postings
 - B) View websites
 - C) View archived versions of websites
 - D) Backup copies of websites
 
Show Answer
11. Which record will reveal information about a mail server for a domain?
- A) A
 - B) Q
 - C) MS
 - D) MX
 
Show Answer
12. Which tool can be used to view web server information?
- A) Netstat
 - B) Netcraft
 - C) Warcraft
 - D) Packetcraft
 
Show Answer
13. What can be configured in most search engines to monitor and alert you of changes to content?
- A) Notifications
 - B) Schedules
 - C) Alerts
 - D) HTTP
 
Show Answer
14. What phase comes after footprinting?
- A) System hacking
 - B) Enumeration
 - C) Scanning
 - D) Transfer files
 
Show Answer
15. If you can’t gain enough information directly from a target, what is another option?
- A) EDGAR
 - B) Social engineering
 - C) Scanning
 - D) Competitive analysis
 
Show Answer
16. What is the purpose of social engineering?
- A) Gain information from a computer through networking and other tools
 - B) Gain information from the web looking for employee names
 - C) Gain information from a job site using a careful eye
 - D) Gain information from a human being through face-to-face or electronic means
 
Show Answer
17. Which of the following would be a very effective source of information as it relates to social engineering?
- A) Social networking
 - B) Port scanning
 - C) Websites
 - D) Job boards
 
Show Answer
18. Footprinting can determine all of the following except __________?
- A) Hardware types
 - B) Software types
 - C) Business processes
 - D) Distribution and number of personnel
 
Show Answer
19. Footprinting has two phases. What are they?
- A) Active and pseudonymous
 - B) Active and passive
 - C) Social and anonymous
 - D) Scanning and enumerating
 
Show Answer
20. Which tool can trace the path of a packet?
- A) Ping
 - B) Tracert
 - C) Whois
 - D) DNS
 
