Go Back on 312-50 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-50 Practice Test


Page 6 out of 153 Pages

Topic 2, Footprinting

Which of the following tools are used for footprinting?(Choose four.)


A.

Sam Spade


B.

 NSLookup


C.

Traceroute


D.

Neotrace


E.

 Cheops





A.
  

Sam Spade



B.
  

 NSLookup



C.
  

Traceroute



D.
  

Neotrace



Explanation: All of the tools listed are used for footprinting except Cheops.

A very useful resource for passively gathering information about a target company
is:


A.

Host scanning


B.

 Whois search


C.

 Traceroute


D.

Ping sweep






B.
  

 Whois search



Explanation: A, C & D are "Active" scans, the question says: "Passively"

Which of the following activities will NOT be considered as passive footprinting?


A.

Go through the rubbish to find out any information that might have been discarded.


B.

 Search on financial site such as Yahoo Financial to identify assets.


C.

 Scan the range of IP address found in the target DNS database.


D.

 Perform multiples queries using a search engine.






C.
  

 Scan the range of IP address found in the target DNS database.



Explanation: Passive footprinting is a method in which the attacker never makes contact
with the target systems. Scanning the range of IP addresses found in the target DNS is
considered making contact to the systems behind the IP addresses that is targeted by the
scan.

User which Federal Statutes does FBI investigate for computer crimes involving email
scams and mail fraud?
 


A.

18 U.S.C 1029 Possession of Access Devices


B.

18 U.S.C 1030 Fraud and related activity in connection with computers


C.

 18 U.S.C 1343 Fraud by wire, radio or television


D.

 18 U.S.C 1361 Injury to Government Property


E.

 18 U.S.C 1362 Government communication systems


F.

 18 U.S.C 1831 Economic Espionage Act


G.

18 U.S.C 1832 Trade Secrets Act






B.
  

18 U.S.C 1030 Fraud and related activity in connection with computers



Explanation: http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030--
000-.html

Network Administrator Patricia is doing an audit of the network. Below are some of
her findings concerning DNS. Which of these would be a cause for alarm?
Select the best answer.
 


A.

There are two external DNS Servers for Internet domains. Both are AD integrated.


B.

All external DNS is done by an ISP.


C.

 Internal AD Integrated DNS servers are using private DNS names that are


D.

 unregistered.


E.

 Private IP addresses are used on the internal network and are registered with the
internal AD integrated DNS server.





A.
  

There are two external DNS Servers for Internet domains. Both are AD integrated.



Explanation: Explanations:
A. There are two external DNS Servers for Internet domains. Both are AD integrated. This
is the correct answer. Having an AD integrated DNS external server is a serious cause for
alarm. There is no need for this and it causes vulnerability on the network.
B. All external DNS is done by an ISP.
This is not the correct answer. This would not be a cause for alarm. This would actually
reduce the company's network risk as it is offloaded onto the ISP.
C. Internal AD Integrated DNS servers are using private DNS names that are
unregistered. This is not the correct answer. This would not be a cause for alarm. This
would actually reduce the company's network risk.
D. Private IP addresses are used on the internal network and are registered with the
internal AD integrated DNS server.
This is not the correct answer. This would not be a cause for alarm. This would actually
reduce the company's network risk.


Page 6 out of 153 Pages
Previous