When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

A. competitive study
B. packet study
C. basic information
D. competitive intelligence


Answer: D

Computer Science & Information Technology

You might also like to view...

Word's AutoRecover feature allows you to:

A) ONLY access temporary files that were not saved. B) quickly save all of your open documents. C) ONLY revert back to an earlier version of your document. D) access files that weren't saved and revert back to earlier versions of documents.

Computer Science & Information Technology

RIP authentication can occur either by passing the authentication keys in clear text or via ____ authentication.

A. SSH B. RC4 C. MD5 D. SHA

Computer Science & Information Technology

The reserved name localhost always corresponds to the IP address 127.0.0.1 so that a local machine can always be referenced by this name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

State two specific functions or jobs that should be segregated in the sales processing system.

What will be an ideal response?

Computer Science & Information Technology