A team is analyzing a site that uses a perimeter module to hide its actual system address. Which technique uncovers the real network location the perimeter module is masking?
Scanning the site's HTML files for comments containing host addresses
Reviewing a config file for instructions on asset addresses
Inspecting older certificate records for references to the true asset
Applying a random security assessment tool on the external domain
Archived certificate logs can hold earlier domain details that point to actual addresses. The site's code might not contain a direct reference to the server IP. A third-party vulnerability scan does not typically expose hidden addresses. Reviewing a configuration file does not guarantee visibility into the true system IP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do archived certificate records reveal the true asset's address?
Open an interactive chat with Bash
What is the role of a perimeter module in masking assets?
Open an interactive chat with Bash
Why are scanning HTML files or third-party tools ineffective in uncovering hidden addresses?