One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.
A. sniffing
B. reconnaissance
C. auditing
D. trapping
Answer: B
Computer Science & Information Technology
You might also like to view...
Which of the following is a software honeypot solution?
A) Snort B) Specter C) Cisco Firepower 4100 series D) Cisco Firepower 9000 series
Computer Science & Information Technology
Define the three possible analyzer result typesresults the Performance Analyzer tool might propose
What will be an ideal response?
Computer Science & Information Technology
When multiple tables are included in a query, a(n) ________ helps you extract the correct records from a related table
Fill in the blank(s) with correct word
Computer Science & Information Technology
Almost all ______________ modems connect to a PCI or PCI Express (PCIe) expansion bus slot inside the computer.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology