An in-house penetration tester is using a packet capture device to listen in on network communicat
ions. This is an example of:
A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch
An in-house penetration tester is using a packet capture device to listen in on network communicat
ions. This is an example of:
A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch