1.

Which of them does not comes under scanning methodologies?(a) Vulnerability scanning(b) Sweeping(c) Port Scanning(d) Google DorksI got this question in quiz.My doubt is from Generic Steps for Security topic in portion Cyber Security of Cyber Security

Answer»

The correct answer is (d) Google Dorks

The BEST I can EXPLAIN: Google dork is used for RECONNAISSANCE, which uses special search queries for NARROWING down the search results. The rest THREE scanning methodologies are used for scanning ports (logical), and network vulnerabilities.



Discussion

No Comment Found

Related InterviewSolutions