Question:
Which of the following techniques is described in the following scenario?
Louis, a professional hacker, had encrypted all of his browsing activity and traveled anonymously to collect sensitive/hidden information about official government or federal databases. He successfully carried out an attack on the target government organization after acquiring the information without being detected.
Take more free practice tests for other ASVAB topics with our
ceh now!