Which of the following is done during passive information gathering?

A) Run a port scan against the target system to find open ports
B) Search the web for any useful information about the company
C) Perform a ping scan against the target system
D) Attempt to connect to shared folders on the target system

B) Search the web for any useful information about the company

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a factor to consider when selecting network cabling?

A) Maximum run length B) Bandwidth C) Interference D) Cable diameter

Computer Science & Information Technology

What are the main characteristics of a good hash function?

a. It's a function that returns a positive integer value. If objects are equal, then its hash numbers must also be the same b. It's a function that returns a positive integer value. If objects are equal, then its hash numbers could be the same c. It can return any random number d. It's a function that returns a positive real number. If the objects are equal, then its hash numbers must be the same

Computer Science & Information Technology