At the beginning of a penetration test, the tester finds a file that includes employee data, such as email addresses, work phone numbers, computers names, and office locations. The file is hosted on a public web server.
Which of the following BEST describes the technique that was used to obtain this information?
A . Enumeration of services
B . OSINT gathering
C . Port scanning
D . Social engineering
Answer: B