Mason is footprinting an organization to gather competitive intelligence. He visits the
company's website for contact information and telephone numbers but does not find any.
He knows the entire staff directory was listed on their website 12 months. How can he find
the directory?
A.
Visit Google’s search engine and view the cached copy
B.
Crawl and download the entire website using the Surfoffline tool and save them to his
computer
C.
Visit the company's partners’ and customers' website for this information
D.
Use WayBackMachine in Archive.org web site to retrieve the Internet archive
Use WayBackMachine in Archive.org web site to retrieve the Internet archive
Which Wireshark filter displays all the packets where the IP address of the source host is
10.0.0.7?
A.
ip.dst==10.0.0.7
B.
ip.port==10.0.0.7
C.
ip.src==10.0.0.7
D.
ip.dstport==10.0.0.7
ip.src==10.0.0.7
One of the steps in information gathering is to run searches on a company using complex
keywords in Google.
Which search keywords would you use in the Google search engine to find all the
PowerPoint presentations containing information about a target company, ROCHESTON?
A.
ROCHESTON fileformat:+ppt
B.
ROCHESTON ppt:filestring
C.
ROCHESTON filetype:ppt
D.
ROCHESTON +ppt:filesearch
ROCHESTON filetype:ppt
Reference:http://blog.hubspot.com/blog/tabid/6307/bid/1264/12-Quick-Tips-To-Search-
Google-Like-An-Expert.aspx(specific document types)
Which of the following is the objective of Gramm-Leach-Bliley Act?
A.
To ease the transfer of financial information between institutions and banks
B.
To protect the confidentiality, integrity, and availability of data
C.
To set a new or enhanced standards for all U.S. public company boards, management
and public accounting firms
D.
To certify the accuracy of the reported financial statement
To ease the transfer of financial information between institutions and banks
Reference:http://www.itap.purdue.edu/security/policies/glb_safeguards_rule_training_gener
al.pdf
Which of the following is NOT related to the Internal Security Assessment penetration
testing strategy?
A.
Testing to provide a more complete view of site security
B.
Testing focused on the servers, infrastructure, and the underlying software, including the
target
C.
Testing including tiers and DMZs within the environment, the corporate network, or
partner company connections
D.
Testing performed from a number of network access points representing each logical
and physical segment
Testing focused on the servers, infrastructure, and the underlying software, including the
target
Page 1 out of 40 Pages |