312-50V12 · Question #323
312-50V12 Question #323: Real Exam Question with Answer & Explanation
The correct answer is B: Dark web footprinting. The scenario describes a hacker using specialized tools and anonymous browsing on encrypted networks to obtain sensitive, hidden government information, which perfectly describes dark web footprinting.
Question
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?
Options
- AWebsite footprinting
- BDark web footprinting
- CVPN footprinting
- DVoIP footprinting
Explanation
The scenario describes a hacker using specialized tools and anonymous browsing on encrypted networks to obtain sensitive, hidden government information, which perfectly describes dark web footprinting.
Common mistakes.
- A. Website footprinting involves gathering publicly available information from standard surface web sources, not accessing hidden content through specialized anonymous channels.
- C. VPN footprinting focuses on identifying and gathering data about VPN infrastructure or users, rather than the general act of anonymously searching for hidden data.
- D. VoIP footprinting is the process of collecting information about Voice over IP systems, which is unrelated to obtaining sensitive database information via anonymous browsing.
Concept tested. Dark web reconnaissance and anonymous information gathering
Reference. https://www.sans.org/blog/dark-web-osint/
Topics
Community Discussion
No community discussion yet for this question.