Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Reconnaissance in information security is used for _______________
Home
Security Assessment
Reconnaissance in information security is used for _______________
0
votes
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
Reconnaissance in information security is used for _______________
Select the appropriate answer from below options:
a) Security reviews
b) Information Analysis
c) Information Gathering
d) Security Testing
reconnaissance
information-security
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Aug 17, 2021
by
Robindeniel
Correct answer of the above question is : c) Information Gathering
Related questions
0
votes
Q: To whom should you express your concerns and suggestions related to information security at your location?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Q: Rohit is a project leader for a team of 30 people. He has to catch an evening flight and so is leaving the office a bit early. He was requested for laptop verification at the security desk while leaving the office. What should Rohit do?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: You are not allowed to classify any information as Public without authorization. Is this statement True or False?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: A process that aims to gain information about a system without directly engaging with the system is known as _______________
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
information-threat
0
votes
Q: A top government official is coming to visit you in one of the Company offices. This person is a prospective client for the Company. Select the appropriate choices to handle the visitor access for such officials
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: Your college friend shares with you code for an e-mail agent that can auto-respond to specific users with pre-defined content. Is it appropriate for you to implement this agent in the Company for a specific business purpose?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: Due care must be taken for virus check while opening encrypted attachments as compared to unencrypted attachments in e-mail. Is this statement True or False?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: You are on leave when you receive an urgent call from your supervisor asking for your login credentials so that another team member can log in and complete the pending request. What should you do in such a situation?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: The primary reason for which I am not allowed to store unlicensed music files on Company assets is that:
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
...