Que: Which of them does not comes under scanning methodologies? a. Vulnerability scanning b. Sweeping c. Port Scanning d. Google Dorks Answer: Google Dorks