Now, which of the following tasks should he perform next?

Posted by: Pdfprep Category: GISP Tags: , ,

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

Information gathering

Determination of network range

Identification of active systems

Location of open ports and applications

Now, which of the following tasks should he perform next?
A . Install a backdoor to log in remotely on the We-are-secure server.
B . Map the network of We-are-secure Inc.
C . Fingerprint the services running on the we-are-secure network.
D . Perform OS fingerprinting on the We-are-secure network.

Answer: D

Leave a Reply

Your email address will not be published.