__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.
(a) Hardware enumeration
(b) System enumeration
(c) Network enumeration
(d) Cloud enumeration
I got this question in an interview for job.
The query is from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,