It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at.
Which of the following is the best way an attacker can passively learn about technologies used in an organization?