Networking Chapter 2 Reconnaissance What Are The Three Classifications Reconnaissance Social Engineering Dumpster Diving

subject Type Homework Help
subject Pages 3
subject Words 508
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 2: Reconnaissance
1. What are the three classifications of reconnaissance?
2. Define and discuss legal reconnaissance.
3. What are the methods and tactics of social engineering?
4. How many methods are available in dumpster diving?
5. What are the tactics of the theft method of dumpster diving?
6. What are the tactics of the copying method of dumpster diving?
7. How many methods are available in Internet footprinting?
8. What are the tactics and techniques involved in the Internet footprinting method of Web
searching?
page-pf2
9. What are the tactics and techniques involved in the Internet footprinting method of network
enumeration?
10. What are the tactics and techniques involved in the Internet footprinting method of Domain Name
System (DNS)-based reconnaissance?
11. What are the tactics and techniques involved in the Internet footprinting method of network-based
reconnaissance?
12. Define and discuss the respective values of the three classifications of surveillance. (Short essay,
Indicate whether the sentence or statement is true or false.
13. ______ Social engineering is an effective way to discover user passwords.
14. ______ Some IM conversations are initiated by robots for the purpose of enticing users to certain
Web sites.
15. ______ It is smart to save time by using the same username and password for all accounts.
16. ______ It is unsafe to dispose of printed drafts of letters in unsecured trash receptacles.
17. ______ Newspapers are useful tools for running exploits on target companies.
page-pf3
18. ______ The WHOIS tool allows the InterNIC database to be queried by using the domain name,
NIC handle, person’s name, IP address, street address, or school.
19. ______ 71.81.18.32 is an example of an IPv6 address.
20. ______ Traceroute and tracert are, respectively, the CLI applications for checking all the routers
between one Internet node and another on GNU/Linux and DOS platforms.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.