Multiple Choice
At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted on a public web server. Which of the following BEST describes the technique that was used to obtain this information?
A) Enumeration of services
B) OSINT gathering
C) Port scanning
D) Social engineering
Correct Answer:

Verified
Correct Answer:
Verified
Q17: A security analyst was provided with a
Q18: A penetration tester wants to script out
Q19: A penetration tester observes that the content
Q20: During a penetration test, a tester runs
Q21: During an internal network penetration test, a
Q23: A company has engaged a penetration tester
Q24: A penetration tester is assessing the security
Q25: A penetration tester reports an application is
Q26: A penetration tester ran the following Nmap
Q27: During testing, a critical vulnerability is discovered