Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
A . Using open source discovery
B . Scanning the network perimeter
C . Social engineering
D . Crafting counterfeit websites
Answer: A
Latest Cybersecurity Audit Certificate Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments