Well, I am not sure that D is correct in this specific case.
The question says "When considering how an attacker MAY EXPLOIT a WEB SERVER".
It's not general question about footprinting and getting knowledge about sites, employees, network range, physical location etc
It is question directed at web server footprinting in the context of exploitation.
I would say the answer is C, and this is about active footprinting that means finding services running and weaknesses (vulnerabilities) that could be exploited.
My answer is C.
The course speaks of a "blueprint" that will be created when the footprinting is complete. This would include the server names, account details, and domains that are available from the company's footprint. I would think that D is the more accurate answer. Ref: Module 2 pg 107-108.
I think the A is more suitable
A. When an attacker creates a complete profile of the site's external links and file structures remains the best fit for the concept of web server footprinting as described in the context of the original question.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
3936e29
1 month, 2 weeks agoshaody
8 months, 3 weeks agokevin403
8 months, 4 weeks agoLordXander
1 year, 1 month agoariel004
1 year, 1 month agosh4dali
1 year, 2 months agoET0722
1 year, 2 months agoqwerty100
1 year, 2 months agonosavotor
1 year, 2 months agoLeongCC
1 year, 2 months ago