Que: Which of the following is not a spot from where attackers seek information?

a. Domain name
b. IP address
c. System enumeration
d. Document files
Answer: Document files

Leave a Comment