The first step in the evaluation of the security posture of the target organization's IT infrastructure is called ________.

A. conceptualizing
B. forensics
C. footprinting
D. networking

Answer: C. footprinting

Computer Science & Information Technology

You might also like to view...

There is a new virus reported on the Internet. What steps should the network administrator take to protect the network from the threat?

A) Convert all operating systems to Linux. B) Use firewall software that permits only trusted sites. C) Make sure antivirus software is installed with the most current version. D) Use a personal firewall.

Computer Science & Information Technology

Explain why spam senders frequently change from one email address and one domain to another. Explain why changing the address does not prevent their victims from responding to their messages.

What will be an ideal response?

Computer Science & Information Technology