Which of the following BEST describes the technique that was used to obtain this information?

Posted by: Pdfprep Category: PT0-001 Tags: , ,

At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted on a public web server.

Which of the following BEST describes the technique that was used to obtain this information?
A . Enumeration of services
B . OSINT gathering
C . Port scanning
D . Social engineering

Answer: B

Leave a Reply

Your email address will not be published.