Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 3 Question 79 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 79
Topic #: 3
[All CPEH-001 Questions]

According to the CEH methodology, what is the next step to be performed after footprinting?

Show Suggested Answer Hide Answer
Suggested Answer: A

Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system.


Contribute your Thoughts:

Fannie
18 hours ago
I believe enumeration comes after footprinting.
upvoted 0 times
...
Katheryn
2 days ago
Scanning, for sure. You can't just jump straight into system hacking without a little recon first. Footprinting is like the appetizer, and Scanning is the main course. Gotta get your ducks in a row before the feast.
upvoted 0 times
...
Kip
3 days ago
I think the next step is scanning.
upvoted 0 times
...
Gayla
4 days ago
Ooh, footprinting! Sounds like we're about to get our spy on. Gotta love a good ol' reconnaissance mission. I'm gonna guess Scanning - can't hack what you can't find, am I right?
upvoted 0 times
...
Vernice
5 days ago
I'm not sure, but I think Scanning could also be a possible next step to identify open ports and services on the target.
upvoted 0 times
...
Whitney
11 days ago
I agree with Harley, Enumeration is the next step because it involves gathering more detailed information about the target.
upvoted 0 times
...
Harley
14 days ago
I think the next step is Enumeration.
upvoted 0 times
...

Save Cancel