Footprinting and Social Engineering Flashcards

1
Q

Footprinting is defined as the process of creating a blueprint or map of an organization’s network
and systems.

A

Footprinting is defined as the process of creating a blueprint or map of an organization’s network
and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

google hack commands

A

filetype
searches only within the text of a particular type of file. The file type to search
must be supplied after the colon. Don’t include a period before the file extension.

link
searches within hyperlinks for a search term and identifies linked pages

cache
identifies the version of a web page. The URL of the site must be supplied after
the colon.

intitle
searches for a term within the title of a document.

inurl
searches only within the URL (web address) of a document. The search term must
follow the colon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Seven steps of information gathering

A
Footprinting Unearth Initial Information
Locate the Network Range
Ascertain Active Machines
Discover Open Ports/Access Points
Detect Operating Systems
Uncover Services on Ports
Map the Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARIN

A

American Registry for Internet Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

URL

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICANN

A

Internet Corporation for Assigned Names and Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RIPE NCC

A

Europe, the Middle East, and parts

of Central Asia)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LACNIC

A

Latin American and Caribbean Internet Addresses

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

APNIC

A

Asia Pacific Network Information Centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify Different Types of DNS Records

A

The following list describes the common DNS record types and their use:

A (address)—Maps a host name to an IP address

SOA (Start of Authority)—Identifies the DNS server responsible for the domain information

CNAME (canonical name)—Provides additional names or aliases for the address record

MX (mail exchange)—Identifies the mail server for the domain

SRV (service)—Identifies services such as directory services
PTR (pointer)—Maps IP addresses to host names

NS (name server)—Identifies other name servers for the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

packet-tracking tools

A

NeoTrace, VisualRoute, and VisualLookout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Email Tracking tools

A

eMailTracking Pro

MailTracking.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common Types Of Attacks?

A

Human-based Human-based social engineering refers to person-to-person interaction to retrieve
the desired information. An example is calling the help desk and trying to find out a password.

Computer-based Computer-based social engineering refers to having computer software
that attempts to retrieve the desired information. An example is sending a user an e-mail and
asking them to reenter a password in a web page to confirm it. This social-engineering attack
is also known as phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Human-Based Social Engineering

A
Impersonating an employee or valid user
Posing as an important user
Using a third person
Calling technical support
Shoulder surfing
Dumpster diving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the next step to be performed after footprinting?

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Faking a website for the purpose of getting a user’s password and username is which type of
social engineering attack?

A

Computer-based