answersLogoWhite

0

What is network footprinting?

Updated: 11/17/2022
User Avatar

Wiki User

12y ago

Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What is network footprinting?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the three phases a computer hacker goes through prior to attacking their victim?

What are the three phases a hacker goes through prior to attacking their victim?a. Footprinting, scanning, and enumerationb. Footprinting, searching, and enumerationc. Footprinting, scanning, and evaluationd. Footprinting, scanning, and engineering


What is footprinting?

the aweser is to go eat a llama


What is the next step to be performed after footprinting in CEH methodology?

enumeration


What do you call the DNA cut into smaller sequences by proteins?

footprinting


List two examples of categories for both passive and active network security attacks?

passive attacks : footprinting, trashing active attacks : sniffing, social engineering


What is carbon footprinting?

A carbon footprint is a measure of the impact human activities have on the environment in terns of the amount of greenhouse gases produced, measured in units of carbon dioxide.


Where can you get custom foot printing?

To provide prevent fraudulent remarking, Brady offers standard and customized footprinting label materials that serve as tamper seals; they produce a visible and irreversible footprint pattern if the seal has been altered.


What are the three phases a hacker goes through prior to attacking their victim?

The three phases a hacker goes through prior to attacking their victim are reconnaissance, scanning, and gaining access. During reconnaissance, the hacker gathers information about the target. In the scanning phase, they look for vulnerabilities that can be exploited. Finally, in the gaining access phase, the hacker exploits the vulnerabilities to access the target system.


The phase of hacking where the attacker creates a profile of the target is known as and is also referred to as?

foot-printing, reconnaissance


What is a network password given by the network?

network


What is meant by the term securing your perimeter network security?

your perimeter network is the network you operate such as you have the internet and your network your network is your perimeter


Difference between telecom network and computer network?

if you are allowed to Telecom network is a Telephone and Cable TV Network and computer network involves computers. What did you do