adplus-dvertising
frame-decoration

Question

What is external footprinting in the context of passive reconnaissance?

a.

Gathering information about the target from external sources

b.

Gathering information about the target's internal network

c.

Conducting on-site testing

d.

Identifying vulnerabilities in the target's systems

Answer: (a).Gathering information about the target from external sources Explanation:External footprinting in passive reconnaissance involves gathering information about the target from external sources, focusing on domains, IP ranges, and routes for the organization.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is external footprinting in the context of passive reconnaissance?

Similar Questions

Discover Related MCQs

Q. Who manages the Domain Name System (DNS) root zone?

Q. What information can be obtained through a WHOIS query?

Q. What information can be obtained from WHOIS information about a domain?

Q. How can the host command in Linux be useful for information gathering?

Q. What tool is commonly used for DNS lookups on Windows, Linux, and macOS systems?

Q. What type of information can be obtained from TLS certificates?

Q. What does an out-of-date TLS certificate indicate?

Q. How can a penetration tester conduct a DNS zone transfer using the 'dig' command?

Q. What information can be obtained from a DNS zone transfer?

Q. In case a zone transfer is not possible, how can DNS information still be gathered?

Q. What can be determined by looking up the IP range of a system?

Q. How can traceroute be useful for a penetration tester?

Q. What is the process of scanning for wireless networks while mobile, often in a car?

Q. Which of the following databases is an open wireless network database?

Q. What is the purpose of public BGP route information servers known as BGP looking glasses?

Q. What is wardriving?

Q. What is the purpose of security search engines like Shodan and Censys?

Q. How can penetration testers use the Google Hacking Database (GHDB) for information gathering?

Q. What is the purpose of sites like haveibeenpwned.com and tools like pwnedOrNot?

Q. Why are source code repositories like GitHub important for penetration testers?