A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?
When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?