Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Which of them does not comes under scanning methodologies?

a) Vulnerability scanning
b) Sweeping
c) Port Scanning
d) Google Dorks

Answer: d
Explanation: Google dork is used for reconnaissance, which uses special search queries for narrowing down the search results. The rest three scanning methodologies are used for scanning ports (logical), and network vulnerabilities.

Join The Discussion