____ is where the tester attempts to gain more knowledge about the target through various kinds of intrusions.

A. Mapping
B. Enumeration
C. Beachhead
D. Discovery


Answer: B

Computer Science & Information Technology

You might also like to view...

A button control enables individuals to add a(n) ________ to a form or report that will perform an action when the button is clicked

A) command button B) image control C) command control D) image button

Computer Science & Information Technology

An input area is defined as:

A) the active cell within a workbook. B) a range of cells containing results based on the output area. C) a display of the name of a worksheet within a workbook. D) a range of cells containing values for variables used in formulas.

Computer Science & Information Technology

What industry standard lists characteristics of quality code?

A. IEEE B. ISO C. SWEBOK D. CBK

Computer Science & Information Technology

What is compression?

a. a VPN used to grant outside entities access into a perimeter network; used to hose resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public b. a subset of asymmetric cryptography based on the use of key pair sets c. the art and science of hiding information from unauthorized third parties d. the removal of redundant or superfluous data or space to reduce the size of a data set

Computer Science & Information Technology