Which of the following is a technique used by an attacker to gather valuable system-level data such as account details, OS, software version, server names, and database schema details?
A. Whois
B. Session hijacking
C. Web server footprinting
D. Vulnerability scanning
Answer: C. Web server footprinting
You might also like to view...
Limitations of the daily diary technique include:
A. accuracy B. legibility C. literacy D. all of the above E. none of the above
Causal relationships can be true even if they do not apply in a majority of cases
a. True b. False Indicate whether the statement is true or false
The United States is the only nation in the Western world whose health care system is organized on the principles of a business model rather than a public service. This is a testament to the fact that economies
A. are independent systems. B. are sometimes irrational. C. are not always opportunistic. D. reflect cultural values.
Answer the following statement(s) true (T) or false (F)
1. Many social scientists contend that race is socially constructed rather than biologically defined. 2. When they first arrived in the United States, Irish immigrants were sometimes considered to be a separate race. 3. Proponents of international colonialism believe that racial prejudice is part of the human psyche and will always exist. 4. Internal colonialism sees prejudice and discrimination as being rooted in labor exploitation.