Ethical Hacking 2 Flashcards

1
Q

When using Nslookup, you must type ____ if you wish to query for a host name outside the domain.

A

The FQDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which DNS tool uses a technique that scans and browses a list of generated names in order to spot domains that capitalize on inadvertent URL misspellings?

A

MSR Strider URL Tracer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of information gathering is carried out by obtaining details that are freely available on the Internet and through various other techniques, without directly coming into contact with the organization’s internal servers?

A

passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are scanning a domain and need to see third party domains that it serves content from, and you need to be able to detect whether the site is being redirected. What tool should you use?

A

MSR Strider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of information are you likely to find in a zone?

A

resource records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which WHOIS tool can be used to see when someone has connected to his or her computer?

A

CallerIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What IP address blocks are valid for use as private IP address networks?

A

10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the traceroute utility determine the path of data through a network?

A

Traceroute sends a pakcet with a TTL value of 1 initially, causing the packet to be returned. It then send sout additional packets, increasing the TTL value by 1 to account for each hop in the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are using the BiDiBLAH toolset and are trying to determine DNS information for a doman that does not allow DNS zone transfers. What utility should you use?

A

jarf-dnsbrute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When identifying security postures for a network, what are can an attacker investigate to find information about authentication mechanisms?

A

Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What file stored at the root of a website and is publicly accessible might contain a list of directories filled with sensitive information that is not to be indexed by search engines?

A

robots.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Regional Internet Registry (RIR) might contain whois database information about an IP address sourced from Russia?

A

APNIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What intelligence gathering stance involves the process of accumulating information from resources such as the Internet that can later be analyzed as business intellignce?

A

Competitive information gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What query protocol can be used to identify IP addresses, domain names, server type, domain name registrar, and name servers for a domain?

A

WHOIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which tool used to locat the network range can be used to reveal relationships between people, organizations, and ideas in the network?

A

TouchGraph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Of which phase of an attack is footprinting an essential element?

A

Reconnaissance

17
Q

You are using the BiDiBLAH toolset and wish to perform a reverse DNS lookup on an IP range. What utility should you use?

A

jarf-rev

18
Q

Which script is used to plot the boundary sections of a class C network?

A

qtrace.pl

19
Q

What statement accuretely descrives how the Universal Man-in-the-Middle Phishing Kit works?

A

The kit creates a fake URL that communicates with the legitimate web site of a targeted organization in real time. When a victim clicks on a link to the URL, they are directed to the fake page.

20
Q

Which type of query can be carried out on a WHOIS database that will provide information about personnel that deal with administration, technical, or billing accounts?

A

Point of contact