3.4 Module 3 Summary and Quiz
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
7 hours 17 minutes
module summary in this module we learned a lot about recalled. We learned about the two different types of re Kon, both passive and active, and when to use each one,
we also learned about Oh so which is that open source intelligence gathering? And I meant imagery, intelligence gathering. We learned a couple different ways. You can use Elektronik and covert surveillance, and we also learned about those active Rick, um, things like dumpster diving and shoulder surfing
Up. Next, we're going to go over types of equipment that are useful, tohave and used during official physical penetration test.
We are going to ends module with just a real quick quiz.
Dwight is planning a Garden party.
Jim would like to infiltrate the party but doesn't know much about the surrounding area. What would be the best way for Jim to learn more about the location without alerting Dwight?
Should he use a human
be dumpster diving?
See, I meant
or is it d covert surveillance?
That's right. See,
Jim would want to use something like Google Maps to perform imagery intelligence to find the lay of the land.
If Kevin is making a batch of his famous chili but won't tell anyone how to make it.
What would be the best way for Stanley Toe? Learn how it's made without getting caught.
Would it be a covert surveillance?
Be shoulder surfing,
see Dumpster diving
or D. I meant
I'll give you just a second to think about this one.
That's right. A covert surveillance would really limit Stanley's chances of getting caught. But Dumpster diving, maybe another viable alternative. He may be able to check the trash for ingredient receipts or containers in in Kevin's trash to see what's in the chili.