An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?
Kashim
Highly Voted 2 years, 8 months ago[Removed]
Highly Voted 2 years, 8 months agoAspiringNerd
Most Recent 1 year, 1 month agoLordJaraxxus
1 year, 3 months agoPisces225
1 year, 3 months agoGrumpy_Old_Coot
1 year, 4 months agoSoleandheel
1 year, 7 months agoYarzo
1 year, 7 months agogoodmate
1 year, 7 months agoAbbey2
1 year, 9 months agoTBOY88
1 year, 8 months agoApplebeesWaiter1122
1 year, 10 months agoronah
1 year, 11 months agoramesh2022
2 years, 3 months agonicekoda
2 years, 5 months agoSandon
2 years, 4 months ago[Removed]
2 years, 5 months agommains
2 years, 6 months agoBlueteam
2 years, 6 months ago