Professional Documents
Culture Documents
UnitI INT244 Questions Seti
UnitI INT244 Questions Seti
UnitI INT244 Questions Seti
5. When a hacker attempts to attack a host via the Internet a) A method for manipulating Google search results to
it is known as what type of attack? promote specific websites.
A. Local access
B. Remote attack b) A technique for exploiting vulnerabilities in Google's
C. Internal attack search engine.
D. Physical access
c) A way to bypass Google's security measures.
6. Banner grabbing is an example of what?
A. Footprinting d) A way to enhance the performance of Google
B. Active operating system fingerprinting searches.
C. Passive operating system fingerprinting
D. Application analysis 16. What are some common threats introduced by
7. What port number does HTTPS use? Footprinting in the context of cybersecurity?
A. 53
B. 443 a) Unauthorized access and data breaches.
C. 80
D. 21 b) Encryption of sensitive information.
10. What does the term "Ethical Hacking" mean? d) Analyzing publicly available documents and data.