Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 282 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 282
Topic #: 1
[All 312-50v12 Questions]

When considering how an attacker may exploit a web server, what is web server footprinting?

  • A. When an attacker creates a complete profile of the site's external links and file structures
  • B. When an attacker uses a brute-force attack to crack a web-server password
  • C. When an attacker implements a vulnerability scanner to identity weaknesses
  • D. When an attacker gathers system-level data, including account details and server names
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shaody
3 months ago
Selected Answer: D
Gather valuable system-level data such as account details, operating system, software versions, server names, and database schema details
upvoted 1 times
...
kevin403
3 months, 1 week ago
Selected Answer: D
D. I got full marks and this is one of the questions.
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: D
CEHv12 - 1810
upvoted 1 times
...
ariel004
8 months, 1 week ago
old Question #: 362 from V11 - it's D
upvoted 1 times
...
sh4dali
8 months, 3 weeks ago
Selected Answer: D
D is correct
upvoted 3 times
...
ET0722
8 months, 3 weeks ago
The course speaks of a "blueprint" that will be created when the footprinting is complete. This would include the server names, account details, and domains that are available from the company's footprint. I would think that D is the more accurate answer. Ref: Module 2 pg 107-108.
upvoted 1 times
...
qwerty100
8 months, 4 weeks ago
Selected Answer: D
D. When an attacker gathers system-level data, including account details and server names
upvoted 1 times
...
nosavotor
8 months, 4 weeks ago
Team is this CEH method correct
upvoted 1 times
...
LeongCC
9 months ago
Selected Answer: A
I think the A is more suitable A. When an attacker creates a complete profile of the site's external links and file structures remains the best fit for the concept of web server footprinting as described in the context of the original question.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...