Which of the following is done during passive information gathering?
A) Run a port scan against the target system to find open ports
B) Search the web for any useful information about the company
C) Perform a ping scan against the target system
D) Attempt to connect to shared folders on the target system
B) Search the web for any useful information about the company
You might also like to view...
Which of the following is NOT a factor to consider when selecting network cabling?
A) Maximum run length B) Bandwidth C) Interference D) Cable diameter
What are the main characteristics of a good hash function?
a. It's a function that returns a positive integer value. If objects are equal, then its hash numbers must also be the same b. It's a function that returns a positive integer value. If objects are equal, then its hash numbers could be the same c. It can return any random number d. It's a function that returns a positive real number. If the objects are equal, then its hash numbers must be the same