Which of the following penetration testing concepts is being used when an attacker uses public Internet databases to enumerate and learn more about a target?

A. Reconnaissance
B. Initial exploitation
C. Pivoting
D. Vulnerability scanning
E. White box testing


Answer: A. Reconnaissance

Computer Science & Information Technology

You might also like to view...

An older type of serial interface connector.

What will be an ideal response?

Computer Science & Information Technology

The term bridge refers to any pathway that can be used to transfer data into or out from a computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ software copies data from a computer's hard disk to backup devices like an external hard drive or online storage location

Fill in the blank(s) with correct word

Computer Science & Information Technology

IEEE 802.16a is a revision of the 802.16 standard that provides a high-speed connection for slowly moving devices.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology