Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 170 Topic 18 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 170 Topic 18 Discussion

312-50v13 Exam Topic 18 Question 170 Discussion:
Question #: 170
Topic #: 18

As part of a penetration test for a financial firm’s smart headquarters in Denver, Colorado, ethical hacker Jordan Lee begins evaluating the IoT infrastructure responsible for lighting, HVAC, and badge-controlled access. Jordan documents details such as device models, manufacturer names, firmware versions, and supported protocols like Zigbee and BLE. This information is used to understand the device ecosystem. Which step of the IoT hacking methodology is being carried out in this phase?


A.

Information gathering


B.

Launch attacks


C.

Vulnerability scanning


D.

Gain remote access


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.