InterviewSolution
Saved Bookmarks
| 1. |
Which of them does not comes under scanning methodologies?(a) Vulnerability scanning(b) Sweeping(c) Port Scanning(d) Google DorksI got this question in quiz.My doubt is from Generic Steps for Security topic in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) Google Dorks |
|