CompTIA PenTest+ PT0-002 Practice Question
When conducting active reconnaissance, which technique is MOST likely to uncover the type of security controls protecting a web application discreetly?
Employ a tool designed to parse HTTP responses for identifying protective patterns and distinct signatures.
Utilize social engineering to covertly gather information on technology stacks from potential internal sources.
Implement DNS zone transfers to map out the network infrastructure and isolate security devices from actual servers.
Engage in meticulously crafting network packets to interact with the server and observe any anomalies in responses.