Register
4:59
Stop
Penetration Tester - Database Penetration Testing
Beginner
1/5
What is dumpster diving?
a.
Using stolen or compromised credentials to gain access to a network
b.
Reverse engineering software to discover its source code
c.
Conducting reconnaissance to map out an organization's network infrastructure
d.
Searching through trash or recycling to obtain sensitive information
e.
Gathering intelligence by eavesdropping on phone calls or conversations
f.
Exploiting vulnerabilities in web applications to gain unauthorized access
Beginner