Sally is a member of a pen test team newly hired to test a bank’s security. She begins searching for IP addresses the bank may own by searching public records on the Internet. She also looks up news articles and job postings to discover information that may be valuable. In what phase of the pen test is Sally working?
Blog
An IT leader who wants to build IT processes according to a…
An IT leader who wants to build IT processes according to a standard model should adopt which standard?
Which resilience technology is appropriate to use where the…
Which resilience technology is appropriate to use where the recovery point objective and recovery time objective are not as time-sensitive?
A new IT leader in an organization wants to introduce qualit…
A new IT leader in an organization wants to introduce quality management into the IT organization. Which is the best standard to use as a reference?
A method where the first personnel involved in a disaster be…
A method where the first personnel involved in a disaster begin notifying others in the organization to inform them of the developing disaster and to enlist their assistance is called a:
Which of the following tools will enable an organization to…
Which of the following tools will enable an organization to better understand the integrity of its business processes?
What is the purpose of using a non-exportable digital certif…
What is the purpose of using a non-exportable digital certificate on a company-owned workstation in the context of a VPN?
A forensic specialist is examining the hard drive of a compu…
A forensic specialist is examining the hard drive of a computer and has determined that the hard drive uses the HFS file system. From which type of computer did the hard drive originate?
What is the term used for a section of code in a program tha…
What is the term used for a section of code in a program that permits someone to bypass access controls and access data or functions?
In the context of logical access controls, how are the terms…
In the context of logical access controls, how are the terms “subject” and “object” related?