What information can you obtain by using the WHOIS tool contained within Sam Spade?- Besides the WHOIS utility covered in this lab, what other functions did you discover are possible with the Sam Spade utility?
- What is the purpose of the tracert command?What useful information does the trace route tool provide? How can this information be used to attack the targeted website?
- Is Sam Spade an intrusive tool?What is you rperspective on the use of a freeware utility such as Sam Spade?
- By its nature, WHOIS information must be publicly available. What do you think companies and organizations should do with regard to this information?
- How can you find out who is the CEO of a company?
- What is the goal when trying to use a search engine for data gathering or foot printing?
b)
- Compare the hash values calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.
- If you were to create a new MD5sum or SHA1sum hash value for the modified Example.txt file, would the value be the same or different from the hash value created in Part 3 of the lab?
- If you want secure email communications without encrypting an email message, what other security countermeasure can you deploy to ensure message integrity?
- When running the GnuPG command, what does the-e switch do? a. Extract b. Encrypt c. Export
- What is the difference between MD5 sum and SHA1 sum hashing calculations? Which is better and why?
- Name the cryptographic algorithms used in this lab.
- What do you need if you want to decrypt encrypted messages and files from a trusted sender
- When running the GnuPG command, what does the-d switch do? a. Detachb. Destroy c. Decrypt
- When creating a GnuPG encryption key, what are ways to create entropy?
Requirements: 3 to 4 pages