Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?
Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?
Port scanning is a technique used in penetration testing with the objective of identifying open ports and services on a computer, which can potentially be exploited to gain unauthorized access to information. This fits the description provided in the question.
this question kinda dumb if im honest but yeah d