An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:
A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch
Answer: A. Passive reconnaissance
Computer Science & Information Technology
You might also like to view...
When used in a menu name, the asterisk character is used to indicate that a character is a hot key. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In Outline view, the text of a Word document appears in a(n) ____ structure using headings and subheadings.
A. alphabetical B. categorical C. random D. hierarchical
Computer Science & Information Technology