Multiple Choice
When he is finished footprinting the network the next step an attacker would take is:
A) Launch a vulnerability scanner
B) Enumerate as much as possible about the policies of each system
C) Attack!
D) Take the information they have gathered and start searching Google
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q7: You are researching an adversary and are
Q8: Maureen returns from lunch and notices her
Q9: Neil is conducting security research on a
Q10: Sean is having a conversation with a
Q11: Which of the following represents the greatest
Q13: "Port scanning" is considered what form of
Q14: During a pentest, you retrieve a USB
Q15: Hayley decides to circumvent the copy protection
Q16: Which of the following are ways to
Q17: When attackers have gained and then maintained