One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.
A. sniffing
B. reconnaissance
C. auditing
D. trapping
Answer: B
Computer Science & Information Technology
You might also like to view...
If you are designing a database, you want to make sure people enter valid data that makes sense in the database.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
?A primary key is composed of exactly two fields.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology