اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 358 من 402

كل الأسئلة

A hacker uses specialized tools and search engines to encrypt and anonymize all browsing, then navigates hidden services to collect sensitive data from government databases and launch attacks without being traced. What technique does this describe?

الخيارات

  • A Dark web footprinting
  • B VoIP footprinting
  • C VPN footprinting
  • D Website footprinting

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.