A penetration tester is crawling a target website that is available to the public. Which of the following represents the actions the penetration tester is performing?

A. URL hijacking
B. Reconnaissance
C. White box testing
D. Escalation of privilege

Answer; B. Reconnaissance

Computer Science & Information Technology

You might also like to view...

________ is the data transfer rate of a network: measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps)

a.Bandwidth b.Broadband c.LTE d.WiMAX

Computer Science & Information Technology

A(n) ____________________ database is very flexible because it can store data for several different but related categories.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology