One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.

A. sniffing
B. reconnaissance
C. auditing
D. trapping

Answer: B

Computer Science & Information Technology

You might also like to view...

If you are designing a database, you want to make sure people enter valid data that makes sense in the database.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?A primary key is composed of exactly two fields.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology