Which of the following is not a spot from where attackers seek information?
(a) Domain name
(b) IP address
(c) System enumeration
(d) Document files
This question was posed to me in quiz.
My enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,