Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GIACCertified Forensics Analyst GCFA Question # 25 Topic 3 Discussion

GIACCertified Forensics Analyst GCFA Question # 25 Topic 3 Discussion

GCFA Exam Topic 3 Question 25 Discussion:
Question #: 25
Topic #: 3

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?


A.

Web ripping


B.

TCP FTP proxy scanning


C.

Fingerprinting


D.

Eavesdropping


Get Premium GCFA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.