Which of the following techniques is used by eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for which of the following techniques is used by an attacker to perform automated searches on the target website and collect specified

Full Certification Question

Which of the following techniques is used by an attacker to perform automated searches on the target website and collect specified information, such as employee names and email addresses?