An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:
A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch
Answer: A. Passive reconnaissance
Computer Science & Information Technology
You might also like to view...
Where is an email access protocol used?
What will be an ideal response?
Computer Science & Information Technology
What is the easiest way to re-execute your “.profile” file?
What will be an ideal response?
Computer Science & Information Technology
A(n) ____________________, or command, is a word that has a specific meaning and action.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Comments automatically print with the worksheet
Indicate whether the statement is true or false
Computer Science & Information Technology