Footprinting is the ________ phase of hacking in which the attacker gains ________ information about a potential target.
A. first / secondary
B. first / primary
C. second / secondary
D. second / primary
Answer: B. first / primary
You might also like to view...
Match the following keyboard navigation controls to their function:
I. Home A. beginning of the document II. End B. end of the document III. Ctrl+End C. top of the previous page IV. Ctrl+PgUp D. end of a line V. Ctrl+Home E. beginning of a line
If you expose a low-key scene according to a reflected-light meter reading will you end up overexposing or underexposing the image?
What will be an ideal response?
In HTML, the content of an element is surrounded by an opening and a closing ____.
A. bracket B. quotation mark C. tag D. dollar sign
The ____________________ panel is grouped with the Metadata panel and can be used to create your own system of identifying files based on their content.
Fill in the blank(s) with the appropriate word(s).