________ is software used for open-source intelligence and forensics. It is useful during the information-gathering phase of all security-related work.

A. Maltego
B. Recon-Dog
C. FOCA
D. Recon-ng

Answer: A. Maltego

Computer Science & Information Technology

You might also like to view...

Why are the extraction and insertion operators always implemented as friends of the class rather than as members of the class?

a. Because the first parameter must be the stream object. b. They don't, they could be members c. Because they return a reference d. Because the stream is passed by reference.

Computer Science & Information Technology

____ software provides tools to create shapes and move them along a specified track.

A. Animation B. Drawing C. CAD D. Graphic

Computer Science & Information Technology