Chapter 4: Footprinting and Reconnaissance 419
- A. Hashing is intended to verify and preserve the integrity of data, but it cannot preserve
confidentiality of that data. - A. MD5 is the most widely used hashing algorithm, followed very closely by SHA1 and the
SHA family of protocols. - C. PGP is a method of encrypting stored data to include e-mails, stored data, and other
similar information. It is a form of public and private key encryption. - B. SSL is used to secure data when it is being transmitted from client to server and back.
The system is supported by most clients, including web browsers and e-mail clients. - D. PKI is used in the process of making SSL function. While it is true that AES, DES, and
3DES can be used in SSL connections, PKI is the only one used consistently in all situations. - C. IPSec operates at the Network layer, or layer 3, of the OSI model, unlike many previous
techniques. - C. The Authentication Header provides authentication services to data, meaning that the
sender of the data can be authenticated by the receiver of the data. - A. Data security services are provided by ESP.
- D. Data can be protected using SSL during transmission. If data is being stored on a hard
drive or flash drive, SSL is not effective at proving cryptographic services. - D. PKI is used with IPSec to allow it to function in environments of any size. IPSec is also
capable of using Preshared Keys if desired by the system owner. - A. Netscape originally developed SSL, but since its introduction the technology has spread
to become a standard supported by many clients such as e-mail, web browsers, VPNs, and
other systems. - A. IPSec uses two modes: Authentication Header (AH) and Encapsulating Security Payload
(ESP). Both modes offer protection to data, but do so in different ways.
Chapter 4: Footprinting and
Reconnaissance
- D. Footprinting is the gathering of information relating to an intended target. The idea is to
gather as much information about the target as possible before starting an attack. - C. Port scanning is typically reserved for later stages of the attack process.
- A. The purpose of system hacking is to gain access to a system with the intention of making
it available for later attacks and interaction.
bapp01.indd 419 22-07-2014 10:56:35