(RATED A+)
insecure application. - ANSWERAn application designed without security devices is
considered a(n):
are faster than manual methods - ANSWERAutomated methods for obtaining network
range information
Traceroute - ANSWERWhich of the following refers to a software program used to
determine the path a data packet traverses to get to a specific IP address?
Whois - ANSWERWhich of the following refers to is the protocol designed to query
databases to look up and identify the registrant of a domain name?
The Wayback Machine - ANSWERWhich of the following refers to the Web application
created by the Internet Archive that takes"snapshots" of a Web site at regular intervals
and makes them available to anyone?
Companies should attempt to keep any and all information secret - ANSWERWhich of
the following statements is NOT true regarding information in a public company?
Google hacking - ANSWERWhich of the following terms refers to using a search engine
to find useful data about a targeted company?
adding unnecessary information to the Web site to throw attackers off the trail. -
ANSWERCountermeasures an organization can take to thwart footprinting of the
organization's Web site include all of the following except:
employinga commonly available proxy service to block the access of sensitive domain
data. - ANSWERCountermeasures that an organization can take regarding protecting
domain information include:
social networking sites - ANSWERFacebook, MySpace, LinkedIn, and Twitter are
referred to as
sanitizing information that is available publicly whenever possible. - ANSWERGoogle
hacking can be thwarted to a high degree by: