Well, I am not sure that D is correct in this specific case.
The question says "When considering how an attacker MAY EXPLOIT a WEB SERVER".
It's not general question about footprinting and getting knowledge about sites, employees, network range, physical location etc
It is question directed at web server footprinting in the context of exploitation.
I would say the answer is C, and this is about active footprinting that means finding services running and weaknesses (vulnerabilities) that could be exploited.
My answer is C.
The course speaks of a "blueprint" that will be created when the footprinting is complete. This would include the server names, account details, and domains that are available from the company's footprint. I would think that D is the more accurate answer. Ref: Module 2 pg 107-108.
I think the A is more suitable
A. When an attacker creates a complete profile of the site's external links and file structures remains the best fit for the concept of web server footprinting as described in the context of the original question.
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
3936e29
5 days agoshaody
7 months, 1 week agokevin403
7 months, 2 weeks agoLordXander
12 months agoariel004
1 year agosh4dali
1 year agoET0722
1 year agoqwerty100
1 year, 1 month agonosavotor
1 year, 1 month agoLeongCC
1 year, 1 month ago