Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer.Where should Harold navigate on the computer to find the file?
A company's job postings? Seriously? That's like the most obvious place to look. I bet the hackers are already there, scouring the listings for vulnerabilities.
This is a tough one, but I'm going to go with A) Searching for web page posting patterns. Call me old-school, but I think that's where the real reconnaissance happens.
I see your point. But I still think B) Analyzing the link popularity of the company's website could also provide valuable information about their technology infrastructure.
I'd go with B) Analyzing the link popularity of the company's website. That's where the real intel is, like who's linking to them and what that says about their online presence.
The correct answer is definitely D) Searching for a company's job postings. That's where you can find all kinds of juicy information about their infrastructure and technologies!
Haydee
6 months agoLeandro
6 months agoBelen
5 months agoVilma
5 months agoAlishia
5 months agoGerald
6 months agoNgoc
5 months agoDalene
6 months agoCherelle
6 months agoSheridan
6 months agoLeonardo
7 months agoAntonio
7 months agoStephaine
7 months agoVicente
6 months agoVicente
6 months agoWilbert
7 months agoGracia
7 months agoValentin
6 months agoLuz
6 months ago