answersLogoWhite

0

What is footprinting?

Updated: 12/23/2022
User Avatar

Wiki User

14y ago

Best Answer

the aweser is to go eat a llama

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is footprinting?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the three phases a computer hacker goes through prior to attacking their victim?

What are the three phases a hacker goes through prior to attacking their victim?a. Footprinting, scanning, and enumerationb. Footprinting, searching, and enumerationc. Footprinting, scanning, and evaluationd. Footprinting, scanning, and engineering


What is the next step to be performed after footprinting in CEH methodology?

enumeration


What do you call the DNA cut into smaller sequences by proteins?

footprinting


What is scanning footprinting and enumeration in Information Assurance?

Scanning in information assurance involves using tools to search and analyze a network for vulnerabilities and weak points. Footprinting is the first step in scanning, where attackers gather information about the target system to understand its structure and potential entry points. Enumeration is the process of extracting more detailed information about the target system, such as usernames and network resources, to plan a potential attack.


What is carbon footprinting?

A carbon footprint is a measure of the impact human activities have on the environment in terns of the amount of greenhouse gases produced, measured in units of carbon dioxide.


List two examples of categories for both passive and active network security attacks?

passive attacks : footprinting, trashing active attacks : sniffing, social engineering


Where can you get custom foot printing?

To provide prevent fraudulent remarking, Brady offers standard and customized footprinting label materials that serve as tamper seals; they produce a visible and irreversible footprint pattern if the seal has been altered.


The phase of hacking where the attacker creates a profile of the target is known as and is also referred to as?

foot-printing, reconnaissance


What is the definition of genomic footprinting?

Same as genetic footprinting, only at a high throughput, systems level way. Typically you use a transposon library to insert mutations to cells that inactivate genes (you assume one transposon/inactivation per cell). Then you trascription profile (dna microarray, rna-seq) after selection (whatever you want to select for, growth, resistance etc) and try to map the mutations/genes inactivations to the fitness changes in the cells. For example if you select for growth in a particular environment and the deletion of a gene confers this, then during selection that mutant will be over-represented, so when you run a microarray, you will see no expression of the deleted gene in reference with the wild type strain.


What technology did the police use to catch Jack the Ripper?

We can't put a Modern Eye Toward an Old Investigation. The Police back them were not complete idiots. The problem with this case is that investigators weren't familiar with murders with no aparent reasons. Is not the same catching a murdering husband because of infidelity and so on. Back then, there was no fingerprinting, footprinting or DNA analisys. The only thing they had was the work of a beat policeman.


Does drive-through have a bigger carbon footprint than take-out from the same fast food restaurant?

Depend if you keep your engine running in the queue for the drive through. The packaging for the food will be similar, and although you get your drive through in a bag, if you went in and ate they put that paper cover on the tray. If you have a vege burger, with salad, that will lower the foot print still further, won't taste as good as a 1/4 pounder with cheese though! Otherwise the difference will be negligible. Learn more about carbon footprinting at the link below.


What are the steps involved in the process of ethical hacking?

Footprinting / Information Gathering :▫Gathering potential information about target system▫A good hacker consumes 90% of time for this phase•Scanning :▫Network is scanned for any vulnerabilities•System Hacking :▫Involves actual hacking▫Taking advantage of vulnerabilities found during scanning, penetrate the victim's system•Maintaining Access :▫Making provisions by planting backdoors•Covering Tracks :▫Removing all the traces of his presence in system by removing log files & event logs