Exam CS0-003 All QuestionsBrowse all questions from this exam
Question 235

An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?

    Correct Answer: A

    The scenario describes an attacker who has gained access to the syslog server and uses the log entries to prioritize future targets. This is an example of passive network footprinting, where the attacker gathers information without interacting directly with the systems themselves. Instead, they rely on available data such as logs to understand the network and identify potential targets.

Discussion
Mike082588Option: A

How would it be passive if he has direct access onto the network and is viewing the server?

Ha89

these final 20+ questions are not answered by anyone and it's annoying really! I'll just go with C.