List of questions
Related questions
Question 327 - 312-50v12 discussion
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?
A.
Dark web footprinting
B.
VoIP footpnnting
C.
VPN footprinting
D.
website footprinting
Your answer:
0 comments
Sorted by
Leave a comment first