exam questions

Exam 312-50v10 All Questions

View all questions & answers for the 312-50v10 exam

Exam 312-50v10 topic 1 question 188 discussion

Actual exam question from ECCouncil's 312-50v10
Question #: 188
Topic #: 1
[All 312-50v10 Questions]

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.
Example:
allintitle: root passwd

  • A. Maintaining Access
  • B. Gaining Access
  • C. Reconnaissance
  • D. Scanning and Enumeration
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...