An analyst has initiated an assessment of an organization’s security posture. As a part of this review, the analyst would like to determine how much information about the organization is exposed externally. Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)

A.
Fingerprinting
B.
DNS query log reviews
C.
Banner grabbing
D.
Internet searches
E.
Intranet portal reviews
F.
Sourcing social network sites
G.
Technical control audits
Explanation:
Maybe D instead of A?
1
0
I tend to agree. In the Venn diagram of the situation presented, social media is a subset of internet searches.
1
0