Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A penetration tester is designing a phishing campaign and wants to build a list of users (or the target organization. Which of the following techniques
A penetration tester is designing a phishing campaign and wants to build a list of users (or the target organization.
Which of the following techniques would be the MOST appropriate? (Select TWO)
-
Query an Internet WHOIS database.
-
Search posted job listings.
-
Scrape the company website.
-
Harvest users from social networking sites.
-
Socially engineer the corporate call center.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started