A threat actor is looking at the IT and technical job postings of a target organization. What would be the most beneficial information to capture from these postings?

IT Questions BankCategory: Ethical HackerA threat actor is looking at the IT and technical job postings of a target organization. What would be the most beneficial information to capture from these postings?

A threat actor is looking at the IT and technical job postings of a target organization. What would be the most beneficial information to capture from these postings?

  • the type of hardware and software used
  • the salaries of the positions listed
  • the hours of work required by the roles listed
  • the employment benefits offered by the company

Explanation: When advertising vacant IT and technical positions, businesses will typically list the hardware and software skills and qualifications required by the successful applicants. This information provides the attacker with helpful information about the hardware and software platforms operated by that business, which can then be used in planning an attack.

Exam with this question: 3.5.3 Quiz - Information Gathering and Vulnerability Scanning Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x