{"id":268,"date":"2022-02-25T19:42:40","date_gmt":"2022-02-25T19:36:13","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question127\/"},"modified":"2022-02-25T19:46:24","modified_gmt":"2022-02-25T19:46:24","slug":"certified-ethical-hacker-v11-312-50v11-question127","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question127\/","title":{"rendered":"Certified Ethical Hacker v11 312-50v11 &#8211; Question127"},"content":{"rendered":"<div class=\"question\">Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mail servers, sender IP addresses, and sender locations from different public sources. He also checks if an email address was leaked using the haveibeenpwned.com API.<br \/>\nWhich of the following tools is used by Wilson in the above scenario?<br \/><strong><br \/>A.<\/strong> Factiva<br \/><strong>B.<\/strong> ZoomInfo<br \/><strong>C.<\/strong> Netcraft<br \/><strong>D.<\/strong> Infoga<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>D<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its systems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and extracts information such as sender identities, mail servers, sender IP addresses, and sender locations from different public sources. He also [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,130],"class_list":["post-268","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker-v11-312-50v11","tag-certified-ethical-hacker-v11-312-50v11","tag-question-127"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":495,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/268\/revisions\/495"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}