During which step of the attacker's methodology, in-depth information about the target, such as user accounts and open shares, is collected?
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: B
You might also like to view...
When the ________ option is used, a change in the source file also appears in the destination file
A) Paste Special B) Paste link C) Paste D) Display as icon
External styles override or take precedence over inline styles
Indicate whether the statement is true or false
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader
Fill in the blank(s) with the appropriate word(s).
Case-Based Critical Thinking QuestionsCase 1-2Tim Sullivan, an up-and-coming Finance Manager, is rehearsing a presentation he will give at the company shareholder meeting. His CEO, James Griffin, is acting as his mentor. The chapter suggests that if you see audience members with confused, puzzled, or frustrated expressions you should _____.
A. mention what you observed and promise to address questions at the end B. make adjustments accordingly C. take a break and discreetly ask the audience members for their input D. take a break and ask a colleague for their opinion