Quiz 4 Flashcards
\_\_\_\_ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs. Answer Samba Bugnosis SamSpade FOCA
SamSpade
What is “competitive intelligence”?
If you want to open a piano studio to compete against another studio that has been in your neighborhood for many years, getting as much information as possible about your competitor is wise. How could you know the studio was successful without being privy to its bank statements? First, many businesses fail after the first year, so the studio being around for years is a testament to the owner doing something right. Second, you can simply park your car across the street from the studio and count the students to get a good idea of the number of clients. You can easily find out the cost of lessons by calling the studio or looking for ads in newspapers, flyers, telephone books, billboards, and so on. Numerous resources are available to help you discover as much as is legally possible about your competition. Business people have been doing this for years. Now this information gathering, called competitive intelligence, is done on an even higher level through technology. As a security professional, you should be able to explain to the company that hired you all the methods competitors use to gather information. To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.
The HTTP \_\_\_\_ method retrieves data by URI. Answer GET PUT POST HEAD
PUT
To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.
True
\_\_\_\_ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs. Answer Samba Bugnosis SamSpade FOCA
SamSpade
How can a computer criminal use HTTP methods before running an exploit on a server?
If you know HTTP methods, you can send a request to a Web server and, from the generated output, determine what OS the Web server is using. You can also find other information that could be used in an attack. After you determine which OS version a company is running, you can search for any exploits that might be used against that network’s systems.
\_\_\_\_ is a tool that is used to perform DNS zone transfers. Answer Whois Netcat Metis Dig
Dig
Why is ATM shoulder surfing much easier than computer shoulder surfing?
ATM theft is much easier than computer shoulder surfing because a keypad has fewer characters to memorize than a computer keyboard. If the person throws away the receipt in a trash can near the ATM, the shoulder surfer can match the PIN with an account number and then create a fake ATM card. Often shoulder surfers use binoculars or high-powered telescopes to observe PINS being entered, making it difficult to protect against this attack.
Some cookies can cause security issues because unscrupulous people might store personal information in cookies that can be used to attack a computer or server.
True
\_\_\_\_ enable you to see all the host computers on a network. In other words, they give you an organization’s network diagram. Answer Web bugs Footprints Zone transfers Namedroppers
Zone transfers
The HTTP CONNECT method starts a remote application-layer loopback of the request message.
False
Network attacks often begin by gathering information from a company’s Web site.
True
The HTTP \_\_\_\_ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body. Answer CONNECT PUT POST HEAD
HEAD
In computer jargon, the process of finding information on a company’s network is called ____________________.
footprinting
List at least five tools available for footprinting.
The following tools can be used for footprinting: Google groups, Whois, SamSpade, Web Data Extractor, FOCA, Necrosoft NS Scan, Google search engine, Namedroppers, White Pages, Metis, Dig, Netcat, Wget, Paros, and Maltego.
As a security tester, should you use social-engineering tactics?
As a security tester, you should never use social-engineering tactics unless the person who hired you gives you permission in writing. You should also confirm on which employees you’re allowed to perform social-engineering tests, and document the tests you conduct. Your documentation should include the responses you received, and all test results should, of course, be confidential.
What is the purpose of a Web bug? How do they relate to or differ from spyware?
A Web bug is a 1-pixel x 1-pixel image file referenced in an <img></img> tag, and it usually works with a cookie. Its purpose is similar to that of spyware and adware: to get information about the person visiting the Web site. Web bugs are not from the same Web site as the Web page creator. They come from third-party companies specializing in data collection. Security professionals need to be aware of cookies and Web bugs to keep these information-gathering tools off company computers.
To help prevent \_\_\_\_ attacks, you must educate your users not to type logon names and passwords when someone is standing directly behind them—or even standing nearby. Answer shoulder-surfing footprinting piggybacking social engineering
shoulder-surfing
How can computer criminals use the Whois utility for their purposes?
The Whois utility is a commonly used tool for gathering IP address and domain information. With just a company’s Web address, you can discover a tremendous amount of information. Unfortunately, attackers can also make use of this information. Often companies don’t realize that they’re publishing information on the Web that computer criminals can use. The Whois utility gives you information on a company’s IP addresses and any other domains the company might be part of.
To see additional parameters that can be used with the \_\_\_\_ command, you can type nc -h at the command prompt. Answer Nslookup Namedroppers Netcat Whois
Netcat
The HTTP ____________________ method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL).
CONNECT