Saved Bookmarks
| 1. |
Which of the following is not a spot from where attackers seek information?(a) Domain name(b) IP address(c) System enumeration(d) Document filesThis question was posed to me in quiz.My enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security |
|
Answer» Correct ANSWER is (d) Document files |
|