02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

420 Appendix A ■ Answers to Review Questions<br />

4. A. System hacking is concerned with several items, including exploiting services on<br />

a system.<br />

5. B. EDGAR can be used to verify the financial filings of a company.<br />

6. B. Operators such as filetype are used to manipulate search results for some search<br />

engines such as Google.<br />

7. A. Job boards are useful in getting an idea of the technology within an organization. By<br />

looking at job requirements, you can get a good idea of the technology present. While the<br />

other options here may provide technical data, job boards tend to have the best chance of<br />

providing it.<br />

8. C. Street-level views using technology such as Google Street View can give you a picture of<br />

what types of security and access points may be present in a location.<br />

9. A. Social engineering can reveal how a company works.<br />

10. C. The Wayback Machine is used to view archived versions of websites if available (not all<br />

websites are archived via the Wayback Machine).<br />

11. A. Port 53 TCP is used for zone transfers concerning DNS.<br />

12. B. Netcraft can be used to view many details about a web server, including IP address, netblock,<br />

last views, OS information, and web server version.<br />

13. C. Alerts can be set up with Google as well as other search engines to monitor changes on a<br />

given website or URL. When a change is detected, the alert is sent to the requestor.<br />

14. C. Scanning comes after the footprinting phase. Footprinting is used to get a better idea of<br />

the target.<br />

15. D. Competitive analysis can prove very effective when you’re trying to gain more detailed<br />

information about a target. Competitive analysis relies on looking at a target’s competitors<br />

in an effort to find out more about the target.<br />

16. D. While a computer, e-mail, or phone may be used, social engineering ultimately uses<br />

other items as tools to gain information from a human being.<br />

17. A. Social networking has proven especially effective for social engineering purposes. Due to<br />

the amount of information people tend to reveal on these sites, they make prime targets for<br />

information gathering.<br />

18. D. Footprinting is not very effective at gaining information about number of personnel.<br />

19. B. Footprinting is typically broken into active and passive phases, which are characterized<br />

by how aggressive the process actually is. Active phases are much more aggressive than<br />

their passive counterparts.<br />

20. B. Tracert is a tool used to trace the path of a packet from source to ultimate destination.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!