The first step in the evaluation of the security posture of the target organization's IT infrastructure is called ________.

A. conceptualizing
B. forensics
C. footprinting
D. networking


Answer: C. footprinting

Computer Science & Information Technology

You might also like to view...

In Microsoft Word 2016, the _____ removes the characters and spaces to the right of the insertion point one at a time.?

A. ?Backspace key B. ?Insert key C. ?End key D. ?Delete key

Computer Science & Information Technology

What is the default data table style?

A) Normal B) Medium 2 C) Medium 1 D) None

Computer Science & Information Technology

A(n) ________ is a picture representation of a program or application that provides a constant stream of information

Fill in the blank(s) with correct word

Computer Science & Information Technology

Once an organization has estimated the worth of various assets, what three questions must be asked to calculate the potential loss from the successful exploitation of a vulnerability?

What will be an ideal response?

Computer Science & Information Technology