The time a hacker spends performing research to locate this information about a company is known as?
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers.
The time a hacker spends performing research to locate this information about a company is known as?
A . Exploration
B . Investigation
C . Reconnaissance
D . Enumeration
Answer: C
Explanation:
Cyber Kill Chain Methodology 1. Reconnaissance – Gathering information about the target.
Latest 312-50v13 Dumps Valid Version with 572 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments