________ involves connecting to or probing TCP and UDP ports on the target system to determine if the services are running or are in a listening state.
In which of the following attacks does an attacker pretend to be a legitimate or authorized person and uses a phone or other communication medium to mislead targets and trick them into revealing information?
In which of the following footprinting threats do competitors launch similar products in the market, alter prices, and undermine the market position of a target organization?
________ refers to the process of testing the organization's security posture using similar techniques and tools as those of an attacker, but with the knowledge and approval of the organization.
________ is software used for open-source intelligence and forensics. It is useful during the information-gathering phase of all security-related work.
________ is a totally non-technical process in which an attacker tricks a person and obtains confidential information in such a way that the target is unaware of the fact that someone is stealing confidential information.
________ are the rapidly increasing online services, platforms, or other sites that allow people to connect with each other and to build social relations.
________ monitors and tracks the emails of a particular user. This kind of tracking is possible through digitally time-stamped records that reveal the time and date when the target receives and opens a specific ________.
________ involve(s) gathering information about a target organization such as URLs, locations, establishment details, number of employees, the specific range of domain names, contact information, etc.
A detailed footprint provides maximum information about the target organization and can help identify vulnerabilities in the target organization's security perimeter.
________ is legal in nature and conducted in order to evaluate the security of a target organization's IT infrastructure with their consent. ________ is the first step in ethical hacking, in which an attacker tries to gather information about a target.
Identify the category of information warfare that uses various techniques such as propaganda and terror, to demoralize one's adversary in an attempt to succeed in battle.
A ________ is a "document established by consensus and approved by a recognized body that provides, for common and repeated use, rules, guidelines, or characteristics for activities or their results, aimed at the achievement of the optimum degree of order in a given context."
Defense in Depth helps to prevent ________ against an information system and its data because a break in one layer only leads the attacker to gain access to a single system.
Defense in Depth uses the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.
A security zone is an area within a network that consists of a group of systems and other components with the same characteristics, all of which serve to manage a secure network.