• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

A threat actor is looking at the IT and technical job postings of a target organization. What would be the most beneficial information to capture from these postings?

  • the type of hardware and software used 
  • the salaries of the positions listed 
  • the hours of work required by the roles listed 
  • the employment benefits offered by the company

Explanation & Hint:

When advertising vacant IT and technical positions, businesses will typically list the hardware and software skills and qualifications required by the successful applicants. This information provides the attacker with helpful information about the hardware and software platforms operated by that business, which can then be used in planning an attack.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments