Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
A . Using open source discovery
B . Scanning the network perimeter
C . Social engineering
D . Crafting counterfeit websites

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments