Quiz Found
CISCO
What is the unauthorized discovery and mapping of systems, services, or vulnerabilities?
What is the unauthorized discovery and mapping of systems, services, or vulnerabilities?
What is the unauthorized discovery and mapping of systems, services, or vulnerabilities?
Answer: Reconnaissance
Learn More :
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.