GIAC Systems and Network Auditor GSNA Question # 28 Topic 3 Discussion

GIAC Systems and Network Auditor GSNA Question # 28 Topic 3 Discussion

GSNA Exam Topic 3 Question 28 Discussion:
Question #: 28
Topic #: 3

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?


A.

Eavesdropping


B.

Fingerprinting


C.

Web ripping


D.

TCP FTP proxy scanning


Get Premium GSNA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.