312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 307


Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced.

Which of the following techniques is described in the above scenario?

Show Answer
Correct Answer: B

The technique described involves encrypting browsing activity and navigating anonymously to obtain sensitive or hidden information, often associated with the dark web. Therefore, the correct technique described in the scenario is dark web footprinting.

Discussion

2 comments
Sign in to comment
insaniuntOption: B
Feb 25, 2024

B. Dark web footprinting

sunce12Option: B
Jun 21, 2024

B. Dark web footprinting