Which one of the following choices lists the two services?

Most hackers run two services first learn information about a 1D0-470
computer or Windows server attached to the Internet or intranet. These services enable hackers to find weaknesses in order to infiltrate the computer or network. Which one of the following choices lists the two services?

Most hackers run two services first learn information about a 1D0-470
computer or Windows server attached to the Internet or intranet. These services enable hackers to find weaknesses in order to infiltrate the computer or network. Which one of the following choices lists the two services?

A.
Ping and traceroute

B.
Nslookup and whois

C.
Whois and ping

D.
Nslookup and traceroute

Explanation:
WHOIS is used to gain information about the primary and secondary name servers. NSLOOKUP is then used to query these name servers to find names and types of existent resources on the network. These tools are used by the hacker in the discovery phase.
Incorrect Answers:
A: The traceroute and the ping commands are essentially the same, both built on the ICMP command. Ping tells you if you can contact the target, and so does traceroute. However, traceroute ALSO gives you the path to the server, identifying hops and the routers along the way. Essentially the two commands are redundant.
C: Ping is useful to test connectivity and existence of resources. Nslookup is, however, a much more dangerous tool in the hands of a hacker.
D: WHOIS would identify the primary and secondary name servers, which you would need before you can use the NSLOOKUP command to query the name servers. At this stage, a ping would be sufficient to find IP addresses in use, and it is not required yet to determine path information.



Leave a Reply 0

Your email address will not be published. Required fields are marked *