In which of the following stages of the web server attack methodology does an attacker determine the web server's remote access capabilities, its ports and services, and other aspects of its security?

A. Information gathering
B. Web server footprinting
C. Website mirroring
D. Vulnerability scanning


Answer: B. Web server footprinting

Sociology

You might also like to view...

You decide to use frequency of attendance at religious services as your measure of religiosity. However, a colleague reviewing your work argues that this measurement does not really capture how religious a person is

In making this argument, your colleague is questioning your __________. a. hypothesis b. validity c. inevitability d. literature review

Sociology

Analyze some of the ethical issues of technology. Illustrate your answer with examples.

What will be an ideal response?

Sociology

In 2013, there were 41 million foreign-born individuals in the United States.

Answer the following statement true (T) or false (F)

Sociology

Which type of evaluation research is best used in the early implantation stages of the program or policy?

a. needs assessment b. formative c. cost benefit d. process e. none of these

Sociology