Which of the following are passive footprinting methods? Choose all that apply.
Which of the following describes a cloud computing CRSF attack?