Fill This Form To Receive Instant Help
Homework answers / question archive / Drew University IS MISC Quiz 5 Question1)A key characteristic of footprinting is that it gathers information about a victim without directly interacting and potentially providing advance notice of the attack
Drew University
IS MISC
Quiz 5
Question1)A key characteristic of footprinting is that it gathers information about a victim without directly interacting and potentially providing advance notice of the attack.
Traceroute identifies the path to a targeted website.
Automated methods for obtaining registrar network range information for a company .
Question 4
Which of the following is NOT considered a readily available source of financial information on publicly traded U.S. companies?
Which of the following is created for the sole purpose of posting unflattering content about a company?
refers to the software designed to query databases to look up and identify the registrant of a domain name.
The inurl string is a Google keyword used to search within a site's uniform resource locator (URL).
Google Hacking Database (GHDB) is a database of queries that can be used to conduct a Google web search to identify sensitive data and content.
Question 10
An effective countermeasure an organization can take to protect domain information is to .
The Root Zone Database page of Internet Assigned Numbers Authority (IANA)
.
The manual method of obtaining network range information requires the attacker to visit at least one or more of the Regional Internet Registries (RIRs), which are responsible for .
Which of the following is NOT considered a source from which valuable information can be gleaned about an intended target?
Google hacking is effective because Google indexes small amounts of information in just a few, focused types of formats.
Which of the following statements is NOT true regarding information in a public company?
Question 18
A countermeasure for protecting domain information is to keep registration data as generic as possible.
The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the Regional Internet Registries (RIRs), which then .
|
Obtaining financial information on companies operating in the United States is difficult because financial records on publicly traded companies are not available to the public.
Network range data from a registrar is useful to the associated company but not an attacker.
The Nslookup tool lists Domain Name System (DNS) nameservers.
File Transfer Protocol (FTP) is considered an insecure application.
Larry is attempting to identify the network route between two Windows systems. What command can he use on one system to identify the network path to the second system?
The Whois tool is primarily used to verify whether a domain name is available or whether it has been registered.
refers to a program to query Internet domain name servers?
A site administrator can block the Internet Archive from making snapshots of the site.
Countermeasures to thwart footprinting of an organization's website include all of the following except .
The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of the Domain Name System (DNS) root, IP addressing, and other Internet protocol resources.
Tonya is conducting reconnaissance of a company that is the target of a penetration test. She would like to search for the company's financial filings with the SEC. What database should she use?
Facebook, LinkedIn, and Twitter are sites.
A website's source code or HTML might prove valuable to a hacker.
Google hacking can be thwarted to a high degree by .
The Regional Internet Registry responsible for North America, including the United States, is the American Registry for Internet Numbers (ARIN).
The amount of personal information that people put online themselves has made gathering information on human beings more difficult.
An attacker can steal a social media user's personal information after a user clicks on a malicious video link.
Already member? Sign In