Ujian Certified Ethical Hacker (CEH) – Chapter 3 FOOTPRINTING

Certified Ethical Hacker (CEH) adalah seorang profesional terampil yang memahami dan mengetahui cara mencari kelemahan dan kerentanan dalam sistem target dan menggunakan pengetahuan dan tool yang sama seperti peretas jahat, tetapi dengan cara yang sah dan sah untuk menilai postur keamanan sistem target. Kredensial CEH mensertifikasi individu dalam disiplin keamanan jaringan khusus Peretasan Etis dari perspektif netral vendor.

Tentang Ujian –

Jumlah Pertanyaan: Hanya 125
Durasi Ujian: 4 Jam
Format Tes: Pertanyaan Pilihan Ganda
Pengiriman Tes: UJIAN ECC, VUE
Awalan Ujian: 312-50 (UJIAN ECC), 312-50 (VUE)

  1. Which of the following best describes footprinting?
    A) Enumeration of services
    B) Discovery of services
    C) Discussion with people
    D) Investigation of a target
  2. Which of the following is not typically used during footprinting?
    A) Search engines
    B) Email
    C) Port scanning
    D) Google hacking
  3. Why use Google hacking?
    A) To fine-tune search results
    B) To speed up searches
    C) To target a domain
    D) To look for information about Google
  4. What is the role of social engineering?
    A) To gain information about computers
    B) To gain information about social media
    C) To gain information from human beings
    D) To gain information about posts and cameras
  5. What is EDGAR used to do?
    A) Validate personnel
    B) Check financial filings
    C) Verify a website
    D) Gain technical details
  6. Which of the following can be used to tweak or fine-tune search results?
    A) Archiving
    B) Operators
    C) Hacking
    D) Refining
  7. Which of the following can an attacker use to determine the technology and structure within an organization?
    A) Job boards
    B) Archives
    C) Google hacking
    D) Social engineering
  8. Which of the following can be used to assess physical security?
    A) Web cams
    B) Satellite photos
    C) Street views
    D) Interviews
  9. Which of the following can help you determine business processes of your target through human interaction?
    A) Social engineering
    B) Email
    C) Website
    D) Job boards
  10. The Wayback Machine is used to do which of the following?
    A) Get job postings
    B) View websites
    C) View archived versions of websites
    D) Backup copies of websites
  11. Which record will reveal information about a mail server for a domain?
    A) A
    B) Q
    C) MS
    D) MX
  12. Which tool can be used to view web server information?
    A) Netstat
    B) Netcraft
    C) Warcraft
    D) Packetcraft
  13. What can be configured in most search engines to monitor and alert you of changes to content?
    A) Notifications
    B) Schedules
    C) Alerts
    D) HTTP
  14. What phase comes after footprinting?
    A) System hacking
    B) Enumeration
    C) Scanning
    D) Transfer files
  15. If you can’t gain enough information directly from a target, what is another option?
    A) EDGAR
    B) Social engineering
    C) Scanning
    D) Competitive analysis
  16. What is the purpose of social engineering?
    A) Gain information from a computer through networking and other tools
    B) Gain information from the web looking for employee names
    C) Gain information from a job site using a careful eye
    D) Gain information from a human being through face-to-face or electronic means
  17. Which of the following would be a very effective source of information as it relates to social engineering?
    A) Social networking
    B) Port scanning
    C) Websites
    D) Job boards
  18. Footprinting can determine all of the following except __?
    A) Hardware types
    B) Software types
    C) Business processes
    D) Distribution and number of personnel
  19. Footprinting has two phases. What are they?
    A) Active and pseudonymous
    B) Active and passive
    C) Social and anonymous
    D) Scanning and enumerating
  20. Which tool can trace the path of a packet?
    A) Ping
    B) Tracert
    C) Whois
    D) DNS
Jawaban
  1. 1. D
  2. 2. C
  3. 3. A
  4. 4. C
  5. 5. B
  6. 6. B
  7. 7. A
  8. 8. C
  9. 9. A
  10. 10. C
  11. 11. D
  12. 12. B
  13. 13. C
  14. 14. C
  15. 15. D
  16. 16. D
  17. 17. A
  18. 18. D
  19. 19. B
  20. 20. B

Leave a ReplyCancel reply