Which of the following tools are used for footprinting?
Which of the following tools are used for footprinting? (Choose four)
What type of Virus is shown here?
what is the next step to be performed after footprinting?
According to the CEH methodology, what is the next step to be performed after footprinting?
What is this deadly attack called?
An attacker finds a web page for a target organization that supplies contact information for the
company. Using available details to make the message seem authentic, the attacker drafts e-mail
to an employee on the contact page that appears to come from an individual who might
reasonably request confidential information, such as a network administrator.
The email asks the employee to log into a bogus page that requests the employee’s user name
and password or click on a link that will download spyware or other malicious programming.
Google’s Gmail was hacked using this technique and attackers stole source code and sensitive
data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social
engineering and malware websites that focused on targeted individuals working for the company.
What is this deadly attack called?
What does the following command accomplish?
NSLookup is a good tool to use to gain additional information about a target network. What does
the following command accomplish?
nslookup
> server <ipaddress>
> set type =any
> ls -d <target.com>
Which of the following statements is incorrect?
what port/service should you look for to attempt a zone transfer?
While footprinting a network, what port/service should you look for to attempt a zone transfer?
How does traceroute map the route a packet travels from point A to point B?
How does traceroute map the route a packet travels from point A to point B?
Which one would you suggest she looks in first?
Your lab partner is trying to find out more information about a competitors web site. The site has a
.com extension. She has decided to use some online whois tools and look in one of the regional
Internet registrys. Which one would you suggest she looks in first?