FootPrinting and Social Engineering Flashcards
Which of the following contains host records for a domain?
DNS
Which of the following is one method of gathering information about the operating systems a company is using?
Search the Web for e-mail addresses of IT emloyees.
Entering a company’s restricted area by following closely behind an authorized person is referred to as which of the following?
Piggybacking
Which of the following is a fast and easy way to gather information about a company?
View the company’s WebSite
Look for company ads in phone directories
What’s the first method a security tester should attempt to find a password for a computer on the network?
Ask the user
Wget is a*nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the internet
True
Which utility can extract meta-data and documents on a website to reveal the document creator’s network login, e-mail address, IP address, and other important information?
FOCA
What’s one way to gather information about a domain?
View the header of an e-mail you send to an e-mail account that doesn’t exist
When conducting competitive intelligence, which of the following is a good way to determine the size of a company’s IT support staff?
Review job posting on Web sites such as www.monster.com and www.dice.com
What tool can be used to read and write data to ports over a network?
Netcat
A cookie can store information about a Web site’s visitors. True of False?
True
To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?
nc -h
Shoulder Surfers can use their skills to find which of the following pieces of information?
ATM PINs
Passwords
Long-Distance access codes
When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?
Spear Phishing
Network attacks can often begin by gathering information from a company’s Web site.
True