Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?
Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?
Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?