GIAC Security Leadership Certification (GSLC)
Question No. 1
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Choose the correct option from the given list.
01 / 552