A cybersecurity analyst at XYZ corporation has been tasked with identifying exposed services and entry points on their corporate network that could be targeted by external adversaries. The organization has a web presence with multiple domains and deploys various internet-facing applications. Which technique should the analyst employ to effectively gather information about the organization's external attack surface?
Reviewing internal network configurations for potential leaks
Using a search engine to gather information about the company's web presence
Conducting an employee survey to understand the use of cloud services
Using a domain name enumeration tool
|Incident Response and Management
|Reporting and Communication