A malicious user is compiling details from public postings and professional networking pages to chart possible email targets and system gaps. Which phase of a recognized infiltration process does this situation describe?
The correct response involves surveying targets, such as locating addresses and employee details, to refine a potential entry strategy. It is often the beginning phase because it informs later steps like crafting malicious files. Another choice about tool implantation appears after tasks that identify entry points. One option mentions collecting stolen authentication secrets, which typically happens once the attacker has found a way into a system. Another answer about stealing information is near the end of the chain, after successful compromise and data access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Reconnaissance phase in cybersecurity?
Open an interactive chat with Bash
How do attackers gather information during the Reconnaissance phase?
Open an interactive chat with Bash
Why is the Reconnaissance phase critical in an attack?