An analyst has initiated an assessment of an organization-s security posture. As a part of this review, the analyst would like to determine how much
information about the organization is exposed externally. Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)
A. Fingerprinting
B. DNS query log reviews
C. Banner grabbing
D. Internet searches
E. Intranet port
al reviews
F. Sourcing social network sites
G. Technical control audits
Explanation: