During which step of the attacker's methodology, in-depth information about the target, such as user accounts and open shares, is collected?

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: B

Computer Science & Information Technology

You might also like to view...

What is the advantage of using structured English to communicate with people in the organization?

What will be an ideal response?

Computer Science & Information Technology

How does a hypervisor allocate hardware?

What will be an ideal response?

Computer Science & Information Technology