PdfPrep.com

Which of the following BEST describes the technique that was used to obtain this information?

At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted on a public web server.

Which of the following BEST describes the technique that was used to obtain this information?
A . Enumeration of services
B . OSINT gathering
C . Port scanning
D . Social engineering

Answer: B

Exit mobile version