Que: Which of them does not comes under scanning methodologies?

a. Vulnerability scanning
b. Sweeping
c. Port Scanning
d. Google Dorks
Answer: Google Dorks

Leave a Comment