Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 3 Question 79 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 79
Topic #: 3
[All CPEH-001 Questions]

According to the CEH methodology, what is the next step to be performed after footprinting?

Show Suggested Answer Hide Answer
Suggested Answer: A

Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system.


Contribute your Thoughts:

Jose
4 days ago
Social Engineering, baby! That's where the real fun begins. After all, who needs fancy tools when you can just trick people into handing over the keys to the kingdom? 'Excuse me, sir, can you please enter your password for me?' *wink wink*
upvoted 0 times
...
Yvonne
8 days ago
I agree with Fannie, enumeration is the next step because it involves gathering more detailed information about the target.
upvoted 0 times
...
Fannie
9 days ago
I believe enumeration comes after footprinting.
upvoted 0 times
...
Katheryn
10 days ago
Scanning, for sure. You can't just jump straight into system hacking without a little recon first. Footprinting is like the appetizer, and Scanning is the main course. Gotta get your ducks in a row before the feast.
upvoted 0 times
...
Kip
11 days ago
I think the next step is scanning.
upvoted 0 times
...
Gayla
12 days ago
Ooh, footprinting! Sounds like we're about to get our spy on. Gotta love a good ol' reconnaissance mission. I'm gonna guess Scanning - can't hack what you can't find, am I right?
upvoted 0 times
...
Vernice
13 days ago
I'm not sure, but I think Scanning could also be a possible next step to identify open ports and services on the target.
upvoted 0 times
...
Whitney
19 days ago
I agree with Harley, Enumeration is the next step because it involves gathering more detailed information about the target.
upvoted 0 times
...
Harley
22 days ago
I think the next step is Enumeration.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77