At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted on a public web server. Which of the following BEST describes the technique that was used to obtain this information?
A) Enumeration of services
B) OSINT gathering
C) Port scanning
D) Social engineering
Correct Answer:
Verified
Q74: A client is asking a penetration tester
Q75: A penetration tester, who is not on
Q76: A penetration tester is attempting to capture
Q77: A penetration tester has run multiple vulnerability
Q78: A vulnerability scan identifies that an SSL
Q80: Which of the following commands would allow
Q81: Which of the following commands will allow
Q82: A penetration tester runs the following on
Q83: A penetration tester discovers an anonymous FTP
Q84: A penetration tester has successfully exploited a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents