Which of them does not comes under scanning methodologies?
(a) Vulnerability scanning
(b) Sweeping
(c) Port Scanning
(d) Google Dorks
I got this question in quiz.
My doubt is from Generic Steps for Security topic in portion Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,