Topic 2, Footprinting
Which of the following tools are used for footprinting?(Choose four.)
A.
Sam Spade
B.
NSLookup
C.
Traceroute
D.
Neotrace
E.
Cheops
A very useful resource for passively gathering information about a target company
is:
A.
Host scanning
B.
Whois search
C.
Traceroute
D.
Ping sweep
Which of the following activities will NOT be considered as passive footprinting?
A.
Go through the rubbish to find out any information that might have been discarded.
B.
Search on financial site such as Yahoo Financial to identify assets.
C.
Scan the range of IP address found in the target DNS database.
D.
Perform multiples queries using a search engine.
User which Federal Statutes does FBI investigate for computer crimes involving email
scams and mail fraud?
A.
18 U.S.C 1029 Possession of Access Devices
B.
18 U.S.C 1030 Fraud and related activity in connection with computers
C.
18 U.S.C 1343 Fraud by wire, radio or television
D.
18 U.S.C 1361 Injury to Government Property
E.
18 U.S.C 1362 Government communication systems
F.
18 U.S.C 1831 Economic Espionage Act
G.
18 U.S.C 1832 Trade Secrets Act
Network Administrator Patricia is doing an audit of the network. Below are some of
her findings concerning DNS. Which of these would be a cause for alarm?
Select the best answer.
A.
There are two external DNS Servers for Internet domains. Both are AD integrated.
B.
All external DNS is done by an ISP.
C.
Internal AD Integrated DNS servers are using private DNS names that are
D.
unregistered.
E.
Private IP addresses are used on the internal network and are registered with the
internal AD integrated DNS server.
Page 6 out of 153 Pages |
Previous |