What information can you retrieve from domain name system

Assignment Help Computer Engineering
Reference no: EM133258458

Question: Using the high-level network diagram of the university's systems and security infrastructure given in the provided illustration sheet titled "Information Gathering Plan," discuss a plan to gather information about the university's systems.

Aims Higher College Network Architecture

Phases and Activities

Gather information
Review Web site
Review company financials and other public reports
Identify employees, open positions, and resumes
Identify technology and software used by the organization
Search for employee forums, blogs, or other postings
Use Google searches to identify exposed information
Determining the network range
DNS lookup / WHOIS
ARIN lookup
Identifying active machines
Ping or port scan
Detecting operating systems
Mapping the network
Trace route and map systems
Look for network design documents or published information.

Consider the following questions:
• How would you determine the university's Internet Protocol (IP) address range?
• What information can you retrieve from the Domain Name System (DNS)?
• How would you footprint the network?
• What information would you want to gather from systems, and how would you gather it?
• What role would social engineering play in your information-gathering process?
• What information would be publicly published, and what would be worth collecting?
• What challenges might you encounter in your scans?
• What data might be missing, and why?

Reference no: EM133258458

Questions Cloud

What are the benefits of social media usage : What are the benefits of social media usage? What are the problems? Do the benefits outweigh the negative aspects of social media
Draw configurations of lists, stacks, queues, and priority : IT 4264 Middle Georgia State University Draw configurations of lists, stacks, queues, and priority queues. Show how they works for add and remove
What are some ethical issues to keep in mind : Nursing Discussion - What are some ethical issues to keep in mind when using Internet-based research? How can you address these issues
Research and compile your list of top 5 trends : There are quite a few websites on Internet offering top 10 technology trends for this year, next year, or next few years. Research and compile your list of top
What information can you retrieve from domain name system : ISM 4320 Palm Beach State College What information can you retrieve from the Domain Name System (DNS)? • How would you footprint the network
What the last communicable diseases affecting your community : What were the last communicable diseases affecting your community (besides covid) and what were the primary, secondary and tertiary prevention
Evaluates postfix expressions composed of single digits : CIS 2520 University of Guelph evaluates postfix expressions composed of single digits and binary operators of +, -, *, and /, for addition, subtraction
List three ways your company can fail to comply : Your job is to supervise the development of the software. List three ways your company can fail to comply with the contract of the navy
Summarize the limitations of the study : NRSG411 Evidence Based Practice and Applied Nursing Research Assignment - Emergency Department Nurses Discussion, Colorado Technical University

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program to ask the user to enter 5 student names

Write a program to ask the user to enter 5 student names and their ages. Output the data from the parallel arrays.

  Discuss possible improvements to the interface

Write down what first comes to mind regarding what is good and bad about how you worked with the tool.

  Make a math tutor program in vb.net

make a math tutor program in VB.Net.

  Define the spirit of the recursion theorem of a program

define the spirit of the recursion theorem of a program.

  Senior management action about preventing possible barriers

Make a recommendation to senior management about preventing possible barriers for full implementation and acceptance of the new system

  What are the types of web caching

What are the types of web caching? Explain each type in detail. Explain the meaning of memory leak, How it effects the client-side performance?

  Discuss cost or possibly government support as your reasons

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short note explaining what the.

  Draw a block diagram indicating the system functions

Draw a block diagram indicating the system functions. Draw blocks for the system controller, the steering servo, and the car dynamics.

  Troubleshooting the software

AV software has eliminated the malware from highly infected system. After the first reboot, an error message is displayed that consists of the reference to strange DLL file that is missing.

  How would you incorporate diversity in designing a team

Think about how to build teams in terms of designing the task, selecting the people, and then, managing their relationships. How would compose a team.

  Explain different instruction format in term of fixed length

Explain the different instruction formats in terms of fixed and variable length. How are these instructions executed in a classical von Neumann machine?

  Explain the difference between data encryption standard

Briefly explain the difference between Data Encryption Standard (DES) and Advanced Encryption Standard (AES)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd