List of questions
Related questions
Question 34 - ICS-SCADA Cyber Security discussion
Which of the hacking methodology steps can be used to identify the applications and vendors used?
A.
Enumeration
B.
OSINT
C.
Scanning
D.
Surveillance
Your answer:
0 comments
Sorted by
Leave a comment first