An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch

Answer: A. Passive reconnaissance

Computer Science & Information Technology

You might also like to view...

When used in a menu name, the asterisk character is used to indicate that a character is a hot key. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In Outline view, the text of a Word document appears in a(n) ____ structure using headings and subheadings.

A. alphabetical B. categorical C. random D. hierarchical

Computer Science & Information Technology