Which of the following is done during the passive information gathering?

a. Run a port scan against the target system to find open ports.
b. Search the company website for any useful information.
c. Perform a ping scan against the target system.
d. Attempt to connect to shared folders on the target system.


ANS: B

Computer Science & Information Technology

You might also like to view...

Concatenating with Strings is done with:

a) reserved words. b) method calls. c) operator overloading. d) operator overloading and method calls.

Computer Science & Information Technology

Cameras with a built-in lens are referred to as ____ cameras.

A. SLR B. compact C. smartphone D. digital video

Computer Science & Information Technology

Once you transform an object, you can apply the same transformation again if you choose the Transform Again command on the Object menu.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

One function of the operating system's kernel is managing the use of the computer's RAM.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology