Applying Reconnaissance Techniques
This chapter includes questions on the following topics:
• Approaches to conducting reconnaissance
• Tasks involved in identifying and reconnoitering a target
• Variables affecting reconnaissance efforts
• Common tools used for discovery or reconnaissance
As a cybersecurity analyst, you’ll need the knowledge and skills to carry out a variety of tasks. Those tasks include configuring and using threat detection tools, performing data analysis, as well as interpreting the results to identify vulnerabilities, threats, and risks to an organization. The end goal is to secure and protect the resources within the organization. Those resources include the servers, network, and data as well as the ...