One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.

A. sniffing
B. reconnaissance
C. auditing
D. trapping


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is a software honeypot solution?

A) Snort B) Specter C) Cisco Firepower 4100 series D) Cisco Firepower 9000 series

Computer Science & Information Technology

Define the three possible analyzer result typesresults the Performance Analyzer tool might propose

What will be an ideal response?

Computer Science & Information Technology

When multiple tables are included in a query, a(n) ________ helps you extract the correct records from a related table

Fill in the blank(s) with correct word

Computer Science & Information Technology

Almost all ______________ modems connect to a PCI or PCI Express (PCIe) expansion bus slot inside the computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology