This is a dedicated watch page for a single video.
Sophia, a security researcher within a company, was assigned the responsibility of verifying the authenticity of images intended for use in the company's publications. She employed these images as search queries and traced the original source and details of the images, encompassing photographs, profile pictures, and memes. Which of the following footprinting techniques did Sophia employ to accomplish her task?