PE 2 - Reconnaissance: Information Gathering Flashcards
You are attempting to find out the operating system and CPU type of systems in your target organization. The DNS server you wish to use for lookup is named ADNS_Server, and the target machine you want the information on is ATARGET_SYSTEM. Which of the following nslookup command series is the best choice for discovering this information? (The output of the commands is redacted.)
A.
> server ADNS_SERVER
…
> set type=HINFO
> ATARGET_SYSTEM
…
B.
> server ATARGET_SYSTEM
…
> set type=HINFO
> ADNS_SERVER
…
C.
> server ADNS_SERVER
…
> set ATARGET_SYSTEM
> type=HINFO
…
D.
> server type=HINFO
…
> set ADNS_SERVER
> ATARGET_SYSTEM
…
A.
> server ADNS_SERVER
…
> set type=HINFO
> ATARGET_SYSTEM
…
A pen test team member sends an e-mail to an address that she knows is not valid inside an organization. Which of the following is the best explanation for why she took this action?
A. To possibly gather information about internal hosts used in the organization’s e-mail system
B. To start a denial-of-service attack
C. To determine an e-mail administrator’s contact information
D. To gather information about how e-mail systems deal with invalidly addressed messages
A. To possibly gather information about internal hosts used in the organization’s e-mail system
From the partial e-mail header provided, which of the following represents the true originator of the e-mail message?
Return-path:
Delivery-date: Wed, 13 Apr 2011 00:31:13 +0200
Received: from mailexchanger.anotherbiz.com([220.15.10.254])
by mailserver.anotherbiz.com running ExIM with esmtp
id xxxxxx-xxxxxx-xxx; Wed, 13 Apr 2011 01:39:23 +0200
Received: from mailserver.anybiz.com ([158.190.50.254] helo=mailserver.anybiz.com)
by mailexchanger.anotherbiz.com with esmtp id xxxxxx-xxxxxx-xx
for USERJOE@anotherbiz.com; Wed, 13 Apr 2011 01:39:23 +0200
Received: from SOMEONEComputer [217.88.53.154] (helo=[SOMEONEcomputer])
by mailserver.anybiz.com with esmtpa (Exim x.xx)
(envelope-from
for USERJOE@anotherbiz.com; Tue, 12 Apr 2011 20:36:08 -0100
Message-ID:
Date: Tue, 12 Apr 2011 20:36:01 -0100
X-Mailer: Mail Client
From: SOMEONE Name
To: USERJOE Name
Subject: Something to consider
…
A. 220.15.10.254.
B. 158.190.50.254.
C. 217.88.53.154.
D. The e-mail header does not show this information.
C. 217.88.53.154.
You are looking for pages with the terms CEH and V9 in their title. Which Google hack is the appropriate one?
A. inurl:CEHinurl:V9
B. allintitle:CEH V9
C. intitle:CEHinurl:V9
D. allinurl:CEH V9
B. allintitle:CEH V9
You are on a Cisco router and wish to identify the path a packet travels to a specific IP. Which of the following is the best command choice for this?
A. ping
B. ifconfig
C. tracert
D. traceroute
D. traceroute
Which of the following activities are not considered passive footprinting? (Choose two.)
A. Dumpster diving
B. Reviewing financial sites for company information
C. Clicking links within the company’s public website
D. Calling the company’s help desk line
E. Employing passive sniffing
D. Calling the company’s help desk line
E. Employing passive sniffing
Examine the following command sequence:
Which of the following best describes the intent of the command sequence?
A. The operator is enumerating a system named someserver.
B. The operator is attempting DNS poisoning.
C. The operator is attempting a zone transfer.
D. The operator is attempting to find a name server.
A. The operator is enumerating a system named someserver.
An organization has a DNS server located in the DMZ and other DNS servers located on the intranet. What is this implementation commonly called?
A. Dynamic DNS
B. DNSSEC
C. Split DNS
D. Auto DNS
C. Split DNS
You are setting up DNS for your enterprise. Server A is both a web server and an FTP server. You want to advertise both services for this machine as name references your customers can use. Which DNS record type would you use to accomplish this?
A. NS
B. SOA
C. MX
D. PTR
E. CNAME
E. CNAME
A company has a publicly facing web application. Its internal intranet-facing servers are separated and protected by a firewall. Which of the following choices would be helpful in protecting against unwanted enumeration?
A. Allowing zone transfers to ANY
B. Ensuring there are no A records for internal hosts on the public-facing name server
C. Changing the preference number on all MX records to zero
D. Not allowing any DNS query to the public-facing name server
B. Ensuring there are no A records for internal hosts on the public-facing name server
Within the DNS system, a primary server (SOA) holds and maintains all records for the zone. Secondary servers will periodically ask the primary if there have been any updates, and if updates have occurred, they will ask for a zone transfer to update their own copies. Under what conditions will the secondary name server request a zone transfer from a primary?
A. When the primary SOA record serial number is higher than the secondary’s
B. When the secondary SOA record serial number is higher than the primary’s
C. Only when the secondary reboots or restarts services
D. Only when manually prompted to do so
A. When the primary SOA record serial number is higher than the secondary’s
Examine the following SOA record:
If a secondary server in the enterprise is unable to check in for a zone update within an hour, what happens to the zone copy on the secondary?
A. The zone copy is dumped.
B. The zone copy is unchanged.
C. The serial number of the zone copy is decremented.
D. The serial number of the zone copy is incremented.
B. The zone copy is unchanged.
Which protocol and port number combination is used by default for DNS zone transfers?
A. UDP 53
B. UDP 161
C. TCP 53
D. TCP 22
C. TCP 53
Examine the following command-line entry:
Which statements are true regarding this command sequence? (Choose two.)
A. Nslookup is in noninteractive mode.
B. Nslookup is in interactive mode.
C. The output will show all mail servers in the zone somewhere.com.
D. The output will show all name servers in the zone somewhere.com.
B. Nslookup is in interactive mode.
C. The output will show all mail servers in the zone somewhere.com.
Joe accesses the company website, www.anybusi.com, from his home computer and is presented with a defaced site containing disturbing images. He calls the IT department to report the website hack and is told they do not see any problem with the site—no files have been changed, and when accessed from their terminals (inside the company), the site appears normally. Joe connects over VPN into the company website and notices the site appears normally. Which of the following might explain the issue?
A. DNS poisoning
B. Route poisoning
C. SQL injection
D. ARP poisoning
A. DNS poisoning