ExamQuestions.com

Register
Login
Certified Secure Software Lifecycle Professional (CSSLP) Exam Questions

ISC

Certified Secure Software Lifecycle Professional (CSSLP)

28 / 190

Question 28:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next? 

Answer options:

A. Perform OS fingerprinting on the We-are-secure network.
B. Map the network of We-are-secure Inc.
C. Install a backdoor to log in remotely on the We-are-secure server.
D. Fingerprint the services running on the we-are-secure network.