Which of the following penetration testing concepts is being used when an attacker uses public Internet databases to enumerate and learn more about a target?
A. Reconnaissance
B. Initial exploitation
C. Pivoting
D. Vulnerability scanning
E. White box testing
Answer: A. Reconnaissance
Computer Science & Information Technology
You might also like to view...
An older type of serial interface connector.
What will be an ideal response?
Computer Science & Information Technology
The term bridge refers to any pathway that can be used to transfer data into or out from a computer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
________ software copies data from a computer's hard disk to backup devices like an external hard drive or online storage location
Fill in the blank(s) with correct word
Computer Science & Information Technology
IEEE 802.16a is a revision of the 802.16 standard that provides a high-speed connection for slowly moving devices.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology