Answer:
Automated information gathering may include techniques to extract details about the target's technology stack and infrastructure, aiding in vulnerability assessment.
Automated information gathering may include techniques to extract details about the target's technology stack and infrastructure, aiding in vulnerability assessment.
You may be interested in:
Web Security MCQs