A penetration tester is crawling a target website that is available to the public. Which of the following represents the actions the penetration tester is performing?
A. URL hijacking
B. Reconnaissance
C. White box testing
D. Escalation of privilege
Answer; B. Reconnaissance
Computer Science & Information Technology
You might also like to view...
________ is the data transfer rate of a network: measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps)
a.Bandwidth b.Broadband c.LTE d.WiMAX
Computer Science & Information Technology
A(n) ____________________ database is very flexible because it can store data for several different but related categories.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology