Where should an ethical hacker start the information-gathering process?
Interview with company
Dumpster diving
Company’s website
Interview employees
What is the common tool for port scanning?
Hping
Amap
Nmap
SuperScan
What does the -sT switch do?
UDP scan
ICMP scan
TCP full connect scan
TCP ACK scan
Which of the following would not be done during information gathering?
Finding physical addresses
Attacking targets
Identifying potential targets
Reviewing company website