Unit2 - Subjective Questions

INT245 • Practice Questions with Detailed Answers

1

Define Footprinting in the context of ethical hacking and explain its primary objectives.

2

Distinguish between Active and Passive information gathering. Provide examples for each.

3

What is OSINT (Open Source Intelligence)? Explain how it aids in the footprinting process.

4

Explain the concept of Google Hacking (Google Dorking). List three common operators used to retrieve sensitive information.

5

Describe the process of Website Information Gathering. What specific data can be extracted using tools like Burp Suite or Whois?

6

What is Social Engineering? Explain the phases involved in a social engineering attack cycle.

7

Discuss how attackers exploit the human psyche to perform social engineering. Mention at least four psychological triggers.

8

Differentiate between Phishing, Spear Phishing, and Whaling.

9

What are Physical Vulnerabilities in the context of penetration testing? Describe Dumpster Diving as a physical attack method.

10

Explain the concept of DNS Footprinting. What information can be gathered from DNS records like A, MX, and NS?

11

Describe Tailgating and Piggybacking in physical security attacks. How can they be prevented?

12

What is Website Mirroring? How does it assist a penetration tester in gathering intelligence?

13

Define Pretexting in social engineering. How does it differ from a simple phishing attack?

14

What is Competitive Intelligence? Why is it considered a part of footprinting?

15

Explain the role of Email Footprinting. How can analyzing email headers help trace the source?

16

Describe Shoulder Surfing as a method of information gathering. List two environments where this is most likely to occur.

17

How does Whois lookup work, and what is the significance of the Top Level Domain (TLD) in information gathering?

18

What is Shodan? How does it differ from traditional search engines like Google in the context of target discovery?

19

Discuss Vishing (Voice Phishing) and Smishing (SMS Phishing) with examples.

20

Derive a comprehensive methodology for footprinting a target organization, detailing the flow from broad scope to specific data.