GIAC Information Security Fundamentals GISF Question # 42 Topic 5 Discussion

GIAC Information Security Fundamentals GISF Question # 42 Topic 5 Discussion

GISF Exam Topic 5 Question 42 Discussion:
Question #: 42
Topic #: 5

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?


A.

TCP FTP proxy scanning


B.

Eavesdropping


C.

Fingerprinting


D.

Web ripping


Get Premium GISF Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.