Deck 4: Footprinting and Social Engineering

Full screen (f)
exit full mode
Question
____ is a tool that is used to gather IP and domain information.

A)Whois
B)Netcat
C)Metis
D)Dig
Use Space or
up arrow
down arrow
to flip the card.
Question
____ enable you to see all the host computers on a network. In other words, they give you an organization's network diagram.

A)Web bugs
B)Footprints
C)Zone transfers
D)Namedroppers
Question
The HTTP ____ allows data to be sent to a Web server.

A)GET
B)PUT
C)POST
D)HEAD
Question
Namedroppers is a tool that can be used to capture Web server information and possible vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.
Question
The HTTP ____ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body.

A)CONNECT
B)PUT
C)POST
D)HEAD
Question
To see additional parameters that can be used with the ____ command, you can type nc -h at the command prompt.

A)Nslookup
B)Namedroppers
C)Netcat
D)Whois
Question
The HTTP ____ method retrieves data by URI.

A)GET
B)PUT
C)POST
D)HEAD
Question
____ is a tool that is used to gather competitive intelligence from Web sites.

A)Whois
B)Netcat
C)Metis
D)Dig
Question
Network attacks often begin by gathering information from a company's Web site.
Question
The HTTP ____ method requests that the entity be stored under the Request-URI.

A)GET
B)PUT
C)POST
D)HEAD
Question
____ is a tool that is used to perform DNS zone transfers.

A)Whois
B)Netcat
C)Metis
D)Dig
Question
To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.
Question
A(n) ____ is a 1-pixel x 1-pixel image file referenced in an tag, and it usually works with a cookie.

A)image bug
B)zone transfer
C)Bugnosis detector
D)Web bug
Question
Some cookies can cause security issues because unscrupulous people might store personal information in cookies that can be used to attack a computer or server.
Question
____ is the most basic HTTP method.

A)GET
B)PUT
C)CONNECT
D)HEAD
Question
The ____ tool can generate a report that can show an attacker how a Web site is structured and lists Web pages that can be investigated for further information.

A)Netcat
B)Paros
C)Dig
D)Whois
Question
____ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs.

A)Samba
B)Bugnosis
C)SamSpade
D)FOCA
Question
____ is a tool that is used to read and write data to ports over a network.

A)Whois
B)Netcat
C)Metis
D)Dig
Question
The HTTP CONNECT method starts a remote application-layer loopback of the request message.
Question
Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.
Question
With commands such as ____, you can perform zone transfers of all DNS records.

A)Dig
B)Whois
C)DNS
D)Netcat
Question
____ means using a knowledge of human nature to get information from people.

A)Fingerprinting
B)Footprinting
C)Zone transferring
D)Social engineering
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Unable to match request
Question
The HTTP ____________________ method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL).
Question
____ can be used to read PINs entered at ATMs or to detect long-distance authorization codes that callers dial.

A)Shoulder surfing
B)Footprinting
C)Zone transferring
D)Social engineering
Question
____ is trailing closely behind an employee who has access to an area without the person realizing that you didn't use a PIN or a security badge to enter the area.

A)Shoulder surfing
B)Footprinting
C)Piggybacking
D)Dumpster diving
Question
____ can be used to gather information useful for computer criminals, like company phone directories, financial reports, interoffice memos, resumes of employees, etc.

A)Shoulder surfing
B)Footprinting
C)Piggybacking
D)Dumpster diving
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request not made by client in allotted time
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server is unavailable due to maintenance or overload
Question
The ____________________ utility gives you information on a company's IP addresses and any other domains the company might be part of.
Question
A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request not understood by server
Question
To help prevent ____ attacks, you must educate your users not to type logon names and passwords when someone is standing directly behind them-or even standing nearby.

A)shoulder-surfing
B)footprinting
C)piggybacking
D)social engineering
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server received invalid response from upstream server
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request not allowed for the resource
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server understands request but refuses to comply
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request could not be fulfilled by server
Question
A(n) ____________________ is a person skilled at reading what users enter on their keyboards, especially logon names and passwords.
Question
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server did not receive a timely response
Question
In computer jargon, the process of finding information on a company's network is called ____________________.
Question
What is "competitive intelligence"?
Question
Why is ATM shoulder surfing much easier than computer shoulder surfing?
Question
List at least five tools available for footprinting.
Question
List the five techniques used by social engineers in their attempts to gain information from unsuspecting people.
Question
How can DNS be used for footprinting?
Question
What is the purpose of a Web bug? How do they relate to or differ from spyware?
Question
As a security tester, should you use social-engineering tactics?
Question
Elaborate on the following statement: "The most difficult job of a security professional is preventing social engineers from getting crucial information from company employees."
Question
How can computer criminals use the Whois utility for their purposes?
Question
How can a computer criminal use HTTP methods before running an exploit on a server?
Question
What type of information is usually gathered by social engineering?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/51
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Footprinting and Social Engineering
1
____ is a tool that is used to gather IP and domain information.

A)Whois
B)Netcat
C)Metis
D)Dig
A
2
____ enable you to see all the host computers on a network. In other words, they give you an organization's network diagram.

A)Web bugs
B)Footprints
C)Zone transfers
D)Namedroppers
C
3
The HTTP ____ allows data to be sent to a Web server.

A)GET
B)PUT
C)POST
D)HEAD
C
4
Namedroppers is a tool that can be used to capture Web server information and possible vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
5
The HTTP ____ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body.

A)CONNECT
B)PUT
C)POST
D)HEAD
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
6
To see additional parameters that can be used with the ____ command, you can type nc -h at the command prompt.

A)Nslookup
B)Namedroppers
C)Netcat
D)Whois
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
7
The HTTP ____ method retrieves data by URI.

A)GET
B)PUT
C)POST
D)HEAD
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a tool that is used to gather competitive intelligence from Web sites.

A)Whois
B)Netcat
C)Metis
D)Dig
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
9
Network attacks often begin by gathering information from a company's Web site.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
10
The HTTP ____ method requests that the entity be stored under the Request-URI.

A)GET
B)PUT
C)POST
D)HEAD
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
11
____ is a tool that is used to perform DNS zone transfers.

A)Whois
B)Netcat
C)Metis
D)Dig
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
12
To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____ is a 1-pixel x 1-pixel image file referenced in an tag, and it usually works with a cookie.

A)image bug
B)zone transfer
C)Bugnosis detector
D)Web bug
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
14
Some cookies can cause security issues because unscrupulous people might store personal information in cookies that can be used to attack a computer or server.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
15
____ is the most basic HTTP method.

A)GET
B)PUT
C)CONNECT
D)HEAD
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ tool can generate a report that can show an attacker how a Web site is structured and lists Web pages that can be investigated for further information.

A)Netcat
B)Paros
C)Dig
D)Whois
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
17
____ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs.

A)Samba
B)Bugnosis
C)SamSpade
D)FOCA
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
18
____ is a tool that is used to read and write data to ports over a network.

A)Whois
B)Netcat
C)Metis
D)Dig
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
19
The HTTP CONNECT method starts a remote application-layer loopback of the request message.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
20
Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
21
With commands such as ____, you can perform zone transfers of all DNS records.

A)Dig
B)Whois
C)DNS
D)Netcat
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
22
____ means using a knowledge of human nature to get information from people.

A)Fingerprinting
B)Footprinting
C)Zone transferring
D)Social engineering
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Unable to match request
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
24
The HTTP ____________________ method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL).
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
25
____ can be used to read PINs entered at ATMs or to detect long-distance authorization codes that callers dial.

A)Shoulder surfing
B)Footprinting
C)Zone transferring
D)Social engineering
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
26
____ is trailing closely behind an employee who has access to an area without the person realizing that you didn't use a PIN or a security badge to enter the area.

A)Shoulder surfing
B)Footprinting
C)Piggybacking
D)Dumpster diving
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
27
____ can be used to gather information useful for computer criminals, like company phone directories, financial reports, interoffice memos, resumes of employees, etc.

A)Shoulder surfing
B)Footprinting
C)Piggybacking
D)Dumpster diving
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request not made by client in allotted time
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server is unavailable due to maintenance or overload
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
30
The ____________________ utility gives you information on a company's IP addresses and any other domains the company might be part of.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request not understood by server
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
33
To help prevent ____ attacks, you must educate your users not to type logon names and passwords when someone is standing directly behind them-or even standing nearby.

A)shoulder-surfing
B)footprinting
C)piggybacking
D)social engineering
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server received invalid response from upstream server
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
35
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request not allowed for the resource
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server understands request but refuses to comply
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Request could not be fulfilled by server
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) ____________________ is a person skilled at reading what users enter on their keyboards, especially logon names and passwords.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
39
MATCHING
Match each term with the correct statement below.
a.HTTP 400 Bad Request
f.HTTP 500 Internal Server Error
b.HTTP 403 Forbidden
g.HTTP 502 Bad Gateway
c.HTTP 404 Not Found
h.HTTP 503 Service Unavailable
d.HTTP 405 Method Not Allowed
i.HTTP 504 Gateway Timeout
e.HTTP 408 Request Timeout
Server did not receive a timely response
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
40
In computer jargon, the process of finding information on a company's network is called ____________________.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
41
What is "competitive intelligence"?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
42
Why is ATM shoulder surfing much easier than computer shoulder surfing?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
43
List at least five tools available for footprinting.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
44
List the five techniques used by social engineers in their attempts to gain information from unsuspecting people.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
45
How can DNS be used for footprinting?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
46
What is the purpose of a Web bug? How do they relate to or differ from spyware?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
47
As a security tester, should you use social-engineering tactics?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
48
Elaborate on the following statement: "The most difficult job of a security professional is preventing social engineers from getting crucial information from company employees."
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
49
How can computer criminals use the Whois utility for their purposes?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
50
How can a computer criminal use HTTP methods before running an exploit on a server?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
51
What type of information is usually gathered by social engineering?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 51 flashcards in this deck.