What technique was used by the Kiley Innovators employee to send information to the rival marketing company?
Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network?