What information can you retrieve from domain name system

Assignment Help Computer Engineering
Reference no: EM133258458

Question: Using the high-level network diagram of the university's systems and security infrastructure given in the provided illustration sheet titled "Information Gathering Plan," discuss a plan to gather information about the university's systems.

Aims Higher College Network Architecture

Phases and Activities

Gather information
Review Web site
Review company financials and other public reports
Identify employees, open positions, and resumes
Identify technology and software used by the organization
Search for employee forums, blogs, or other postings
Use Google searches to identify exposed information
Determining the network range
DNS lookup / WHOIS
ARIN lookup
Identifying active machines
Ping or port scan
Detecting operating systems
Mapping the network
Trace route and map systems
Look for network design documents or published information.

Consider the following questions:
• How would you determine the university's Internet Protocol (IP) address range?
• What information can you retrieve from the Domain Name System (DNS)?
• How would you footprint the network?
• What information would you want to gather from systems, and how would you gather it?
• What role would social engineering play in your information-gathering process?
• What information would be publicly published, and what would be worth collecting?
• What challenges might you encounter in your scans?
• What data might be missing, and why?

Reference no: EM133258458

Questions Cloud

What are the benefits of social media usage : What are the benefits of social media usage? What are the problems? Do the benefits outweigh the negative aspects of social media
Draw configurations of lists, stacks, queues, and priority : IT 4264 Middle Georgia State University Draw configurations of lists, stacks, queues, and priority queues. Show how they works for add and remove
What are some ethical issues to keep in mind : Nursing Discussion - What are some ethical issues to keep in mind when using Internet-based research? How can you address these issues
Research and compile your list of top 5 trends : There are quite a few websites on Internet offering top 10 technology trends for this year, next year, or next few years. Research and compile your list of top
What information can you retrieve from domain name system : ISM 4320 Palm Beach State College What information can you retrieve from the Domain Name System (DNS)? • How would you footprint the network
What the last communicable diseases affecting your community : What were the last communicable diseases affecting your community (besides covid) and what were the primary, secondary and tertiary prevention
Evaluates postfix expressions composed of single digits : CIS 2520 University of Guelph evaluates postfix expressions composed of single digits and binary operators of +, -, *, and /, for addition, subtraction
List three ways your company can fail to comply : Your job is to supervise the development of the software. List three ways your company can fail to comply with the contract of the navy
Summarize the limitations of the study : NRSG411 Evidence Based Practice and Applied Nursing Research Assignment - Emergency Department Nurses Discussion, Colorado Technical University

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd