Free CompTIA PenTest+ PT0-002 Practice Question

A penetration tester has been tasked with gathering information about a target company without directly interacting with the company's systems. Which of the following methods would be most effective and appropriate for the tester to utilize to obtain potential user names, technology stacks, and job roles within the company?

  • Using Shodan to scan for vulnerable company assets and extract employee information

  • Reviewing the company's open-source code contributions for potential user names and job roles

  • Social media scraping to review profiles and posts for key employee information

  • Performing DNS lookups to identify potential usernames and job roles

This question's topic:
CompTIA PenTest+ PT0-002 / 
Information Gathering and Vulnerability Scanning
Your Score:

Check or uncheck an objective to set which questions you will receive.