Certified Ethical Hacker (CEH) Practice Question

During the footprinting phase, you must enumerate as many subdomains of the target organization as possible without generating any traffic toward its infrastructure. After harvesting WHOIS data, which of the following techniques best meets this requirement?

  • Attempt a full DNS zone transfer from the target's authoritative name servers using dig axfr.

  • Perform an unauthenticated SNMP sweep of the target's gateway to list known hosts.

  • Run an Nmap TCP SYN and version scan against the target's IP address range.

  • Query public Certificate Transparency logs (for example, search crt.sh for issued certificates).

Certified Ethical Hacker (CEH)
Reconnaissance Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot