Examlex
Which of the following penetration testing concepts is being used when an attacker uses public Internet databases to enumerate and learn more about a target?
Spoofing
A malicious practice where an attacker impersonates another device or user on a network, aiming to deceive systems or individuals for unauthorized access or data theft.
Social Engineering
The art of manipulating people so they give up confidential information or perform actions they wouldn't normally consider.
Human Interaction
The process and dynamics of humans communicating and interacting with each other, often studied in psychology and social sciences.
Corporate Security
Encompasses strategies and practices to protect a company's information, assets, and employees from threats such as cyber-attacks, theft, and vandalism.
Q129: A manager has assigned a group of
Q209: A company has a security policy that
Q311: A systems administrator is increasing the security
Q342: An instructor was preparing for a one-hour
Q598: While reviewing the wireless router, the systems
Q774: A security professional wants to test a
Q898: Audit logs from a small company's vulnerability
Q925: Which of the following impacts are associated
Q995: A security administrator wishes to implement a
Q1161: A penetration tester was able to connect