Which of the following is a technique used by an attacker to gather valuable system-level data such as account details, OS, software version, server names, and database schema details?

A. Whois
B. Session hijacking
C. Web server footprinting
D. Vulnerability scanning


Answer: C. Web server footprinting

Sociology

You might also like to view...

Limitations of the daily diary technique include:

A. accuracy B. legibility C. literacy D. all of the above E. none of the above

Sociology

Causal relationships can be true even if they do not apply in a majority of cases

a. True b. False Indicate whether the statement is true or false

Sociology

The United States is the only nation in the Western world whose health care system is organized on the principles of a business model rather than a public service. This is a testament to the fact that economies

A. are independent systems. B. are sometimes irrational. C. are not always opportunistic. D. reflect cultural values.

Sociology

Answer the following statement(s) true (T) or false (F)

1. Many social scientists contend that race is socially constructed rather than biologically defined. 2. When they first arrived in the United States, Irish immigrants were sometimes considered to be a separate race. 3. Proponents of international colonialism believe that racial prejudice is part of the human psyche and will always exist. 4. Internal colonialism sees prejudice and discrimination as being rooted in labor exploitation.

Sociology