Topic 2, Footprinting
Which one of the following is defined as the process of distributing incorrect
Internet Protocol (IP) addresses/names with the intent of diverting traffic?
A.
Network aliasing
B.
Domain Name Server (DNS) poisoning
C.
Reverse Address Resolution Protocol (ARP)
D.
Port scanning
Domain Name Server (DNS) poisoning
Explanation:
This reference is close to the one listed DNS poisoning is the correct answer.
This is how DNS DOS attack can occur. If the actual DNS records are unattainable to the
attacker for him to alter in this fashion, which they should be, the attacker can insert this
data into the cache of there server instead of replacing the actual records, which is referred
to as cache poisoning.
You are footprinting Acme.com to gather competitive intelligence. You visit the
acme.com websire for contact information and telephone number numbers but do
not find it listed there. You know that they had the entire staff directory listed on
their website 12 months ago but now it is not there. How would it be possible for you
to retrieve information from the website that is outdated?
A.
Visit google search engine and view the cached copy.
B.
Visit Archive.org site to retrieve the Internet archive of the acme website.
C.
Crawl the entire website and store them into your computer.
D.
Visit the company’s partners and customers website for this information.
Visit Archive.org site to retrieve the Internet archive of the acme website.
Explanation: The Internet Archive (IA) is a non-profit organization dedicated to
maintaining an archive of Web and multimedia resources. Located at the Presidio in San
Francisco, California, this archive includes "snapshots of the World Wide Web" (archived
copies of pages, taken at various points in time), software, movies, books, and audio
recordings (including recordings of live concerts from bands that allow it). This site is found
at www.archive.org.
How does Traceroute map the route that a packet travels from point A to point B?
A.
It uses a TCP Timestamp packet that will elicit a time exceed in transit message.
B.
It uses a protocol that will be rejected at the gateways on its way to its destination.
C.
It manipulates the value of time to live (TTL) parameter packet to elicit a time exceeded
in transit message.
D.
It manipulated flags within packets to force gateways into generating error messages.
It manipulates the value of time to live (TTL) parameter packet to elicit a time exceeded
in transit message.
Explanation: Traceroute works by increasing the "time-to-live" value of each successive
batch of packets sent. The first three packets have a time-to-live (TTL) value of one
(implying that they make a single hop). The next three packets have a TTL value of 2, and
so on. When a packet passes through a host, normally the host decrements the TTL value
by one, and forwards the packet to the next host. When a packet with a TTL of one reaches
a host, the host discards the packet and sends an ICMP time exceeded (type 11) packet to
the sender. The traceroute utility uses these returning packets to produce a list of hosts
that the packets have traversed en route to the destination.
Your company trainee Sandra asks you which are the four existing Regional Internet
Registry (RIR's)?
A.
APNIC, PICNIC, ARIN, LACNIC
B.
RIPE NCC, LACNIC, ARIN, APNIC
C.
RIPE NCC, NANIC, ARIN, APNIC
D.
RIPE NCC, ARIN, APNIC, LATNIC
RIPE NCC, LACNIC, ARIN, APNIC
Explanation: All other answers include non existing organizations (PICNIC, NANIC,
LATNIC). See http://www.arin.net/library/internet_info/ripe.html
While footprinting a network, what port/service should you look for to attempt a zone
transfer?
A.
53 UDP
B.
53 TCP
C.
25 UDP
D.
25 TCP
E.
161 UDP
F.
22 TCP
G.
60 TCP
53 TCP
Explanation: IF TCP port 53 is detected, the opportunity to attempt a zone transfer is
there.
Page 5 out of 153 Pages |
Previous |