An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch


Answer: A. Passive reconnaissance

Computer Science & Information Technology

You might also like to view...

Where is an email access protocol used?

What will be an ideal response?

Computer Science & Information Technology

What is the easiest way to re-execute your “.profile” file?

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________, or command, is a word that has a specific meaning and action.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Comments automatically print with the worksheet

Indicate whether the statement is true or false

Computer Science & Information Technology