5:00
Stop
CEH - Footprinting and Reconnaissance - Footprinting through Social Engineering
Advanced
1/5
Scenario: You have been hired to assess the security posture of EnergyTech Corp, a power utility company. You need to gather information about their infrastructure and security awareness level before testing their defenses. While researching online, you discover they're hosting a public job fair next week where IT managers will be present. What social engineering footprinting approach would be most effective and least likely to raise suspicions?
Advanced