Footprinting is the ________ phase of hacking in which the attacker gains ________ information about a potential target.

A. first / secondary
B. first / primary
C. second / secondary
D. second / primary


Answer: B. first / primary

Computer Science & Information Technology

You might also like to view...

Match the following keyboard navigation controls to their function:

I. Home A. beginning of the document II. End B. end of the document III. Ctrl+End C. top of the previous page IV. Ctrl+PgUp D. end of a line V. Ctrl+Home E. beginning of a line

Computer Science & Information Technology

If you expose a low-key scene according to a reflected-light meter reading will you end up overexposing or underexposing the image?

What will be an ideal response?

Computer Science & Information Technology

In HTML, the content of an element is surrounded by an opening and a closing ____.

A. bracket B. quotation mark C. tag D. dollar sign

Computer Science & Information Technology

The ____________________ panel is grouped with the Metadata panel and can be used to create your own system of identifying files based on their content.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology