02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

256 Chapter 10 ■ Social Engineering<br />

13. A security camera picks up someone who doesn’t work at the company following closely<br />

behind an employee while they enter the building. What type of attack is taking place?<br />

A. Phishing<br />

B. Walking<br />

C. Gate running<br />

D. Tailgating<br />

14. What is a vulnerability scan?<br />

A. A way to find open ports<br />

B. A way to diagram a network<br />

C. A proxy attack<br />

D. A way to automate the discovery of vulnerabilities<br />

15. A proxy is used to .<br />

A. Assist in scanning<br />

B. Perform a scan<br />

C. Keep a scan hidden<br />

D. Automate the discovery of vulnerabilities<br />

16. TOR is intended to .<br />

A. Hide web browsing<br />

B. Hide the process of scanning<br />

C. Automate scanning<br />

D. Hide the banner on a system<br />

17. Human beings tend to follow set patterns and behaviors known as .<br />

A. Human nature<br />

B. Habits<br />

C. Primacy<br />

D. Piggybacking<br />

18. When talking to a victim, using can make an attack easier.<br />

A. Eye contact<br />

B. Keywords<br />

C. Jargon<br />

D. Threats

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!