List of questions
Related questions
Question 264 - 312-50v12 discussion
jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps jane map the website's directories and gain valuable information.
What is the attack technique employed by Jane in the above scenario?
A.
website mirroring
B.
Session hijacking
C.
Web cache poisoning
D.
Website defacement
Your answer:
0 comments
Sorted by
Leave a comment first