{"id":456,"date":"2022-02-25T19:45:53","date_gmt":"2022-02-25T19:39:34","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question315\/"},"modified":"2022-02-25T19:46:29","modified_gmt":"2022-02-25T19:46:29","slug":"certified-ethical-hacker-v11-312-50v11-question315","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question315\/","title":{"rendered":"Certified Ethical Hacker v11 312-50v11 &#8211; Question315"},"content":{"rendered":"<div class=\"question\">Lewis, a professional hacker, targeted the IoT cameras and devices used by a target venture-capital firm.<br \/>\nHe used an information-gathering tool to collect information about the IoT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the Internet, further allowing him to exploit these devices in the network.<br \/>\nWhich of the following tools was employed by Lewis in the above scenario?<br \/><strong><br \/>A.<\/strong> NeuVector<br \/><strong>B.<\/strong> Lacework<br \/><strong>C.<\/strong> Censys<br \/><strong>D.<\/strong> Wapiti<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lewis, a professional hacker, targeted the IoT cameras and devices used by a target venture-capital firm. He used an information-gathering tool to collect information about the IoT devices connected to a network, open ports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,318],"class_list":["post-456","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker-v11-312-50v11","tag-certified-ethical-hacker-v11-312-50v11","tag-question-315"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/456\/revisions"}],"predecessor-version":[{"id":683,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/456\/revisions\/683"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/media?parent=456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/categories?post=456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/tags?post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}