Topic 2, Footprinting
You receive an email with the following message:
Hello Steve,
We are having technical difficulty in restoring user database record after the recent
blackout. Your account data is corrupted. Please logon to the SuperEmailServices.com and
change your password.
Question No : 31 - (Topic 2)
ECCouncil 312-50 : Practice Test
Best Solution to Pass Your Exam 21
http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm
If you do not reset your password within 7 days, your account will be permanently disabled
locking you out from our e-mail services.
Sincerely,
Technical Support
SuperEmailServices
From this e-mail you suspect that this message was sent by some hacker since you
have been using their e-mail services for the last 2 years and they have never sent
out an e-mail such as this. You also observe the URL in the message and confirm
your suspicion about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers.
You immediately enter the following at Windows 2000 command prompt:
Ping 0xde.0xad.0xbe.0xef
You get a response with a valid IP address.
What is the obstructed IP address in the e-mail URL?
A.
222.173.190.239
B.
233.34.45.64
C.
54.23.56.55
D.
199.223.23.45
222.173.190.239
Explanation: 0x stands for hexadecimal and DE=222, AD=173, BE=190 and EF=239
To what does “message repudiation” refer to what concept in the realm of email
security?
A.
Message repudiation means a user can validate which mail server or servers a message
was passed through.
B.
Message repudiation means a user can claim damages for a mail message that
damaged their reputation.
C.
Message repudiation means a recipient can be sure that a message was sent from a
particular person.
D.
Message repudiation means a recipient can be sure that a message was sent from a
certain host.
E.
Message repudiation means a sender can claim they did not actually send a particular
message.
Message repudiation means a sender can claim they did not actually send a particular
message.
Explanation: A quality that prevents a third party from being able to prove that a
communication between two other parties ever took place. This is a desirable quality if you
do not want your communications to be traceable.
Non-repudiation is the opposite quality—a third party can prove that a communication
between two other parties took place. Non-repudiation is desirable if you want to be able to
trace your communications and prove that they occurred. Repudiation – Denial of message
submission or delivery.
Your lab partner is trying to find out more information about a competitors web site.
The site has a .com extension. She has decided to use some online whois tools and
look in one of the regional Internet registrys. Which one would you suggest she
looks in first?
A.
LACNIC
B.
ARIN
C.
APNIC
D.
RIPE
E.
AfriNIC
ARIN
Explanation: Regional registries maintain records from the areas from which they govern.
ARIN is responsible for domains served within North and South America and therefore,
would be a good starting point for a .com domain.
NSLookup is a good tool to use to gain additional information about a target
network. What does the following command accomplish?
nslookup
> server <ipaddress>
> set type =any
> ls -d <target.com>
A.
Enables DNS spoofing
B.
Loads bogus entries into the DNS table
C.
Verifies zone security
D.
Performs a zone transfer
E.
Resets the DNS cache
Performs a zone transfer
Explanation: If DNS has not been properly secured, the command sequence displayed
above will perform a zone transfer.
The FIN flag is set and sent from host A to host B when host A has no more data to
transmit (Closing a TCP connection). This flag releases the connection resources.
However, host A can continue to receive data as long as the SYN sequence number
of transmitted packets from host B are lower than the packet segment containing the
set FIN flag.
A.
True
B.
False
True
Explanation: For sequence number purposes, the SYN is considered to occur before the
first actual data octet of the segment in which it occurs, while the FIN is considered to occur
after the last actual data octet in a segment in which it occurs. So packets receiving out of
order will still be accepted
Page 7 out of 153 Pages |
Previous |