During which step of the attacker's methodology, in-depth information about the target, such as user accounts and open shares, is collected?

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege


ANS: B

Computer Science & Information Technology

You might also like to view...

When the ________ option is used, a change in the source file also appears in the destination file

A) Paste Special B) Paste link C) Paste D) Display as icon

Computer Science & Information Technology

External styles override or take precedence over inline styles

Indicate whether the statement is true or false

Computer Science & Information Technology

________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 1-2Tim Sullivan, an up-and-coming Finance Manager, is rehearsing a presentation he will give at the company shareholder meeting. His CEO, James Griffin, is acting as his mentor. The chapter suggests that if you see audience members with confused, puzzled, or frustrated expressions you should _____.

A. mention what you observed and promise to address questions at the end B. make adjustments accordingly C. take a break and discreetly ask the audience members for their input D. take a break and ask a colleague for their opinion

Computer Science & Information Technology