Which technique involves collecting information about server locations and types?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which technique involves collecting information about server locations and types?

Explanation:
Collecting information about where servers are located and what kinds of servers run the services is about using DNS queries to map the target’s infrastructure. DNS Interrogation involves querying DNS records to uncover details like IP addresses (A/AAAA records), reverse lookups (PTR), nameservers (NS), aliases (CNAME), and service endpoints (SRV). From these records you can infer geographic locations of hosts, identify the use of CDNs or load-balanced front ends, and get clues about the types of services and servers behind the domain. DNS Rebinding Attack isn’t about gathering infrastructure details; it’s an exploit that aims to trick a browser into communicating with a private IP. A Load Balancer is a device that distributes traffic, not a technique for information gathering. OWASP ZAP is a vulnerability scanning tool, not specifically about collecting server locations or types.

Collecting information about where servers are located and what kinds of servers run the services is about using DNS queries to map the target’s infrastructure. DNS Interrogation involves querying DNS records to uncover details like IP addresses (A/AAAA records), reverse lookups (PTR), nameservers (NS), aliases (CNAME), and service endpoints (SRV). From these records you can infer geographic locations of hosts, identify the use of CDNs or load-balanced front ends, and get clues about the types of services and servers behind the domain.

DNS Rebinding Attack isn’t about gathering infrastructure details; it’s an exploit that aims to trick a browser into communicating with a private IP. A Load Balancer is a device that distributes traffic, not a technique for information gathering. OWASP ZAP is a vulnerability scanning tool, not specifically about collecting server locations or types.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy