In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.
Example:
allintitle: root passwd
A. Maintaining Access
B. Gaining Access
Reconnaissance
Scanning and Enumeration
EC-Council Certified Ethical Hacker v11Free dumps for 312-50v11 in Printable PDF format.High quality PDF and software. VALID exam to help you pass. |
Reconnaissance
Reconnaissance
Correct answer is C (Reconnaissance)
correct answer is C because it is passive seacrh it is simply google hacking !!