There are __________ types of cognitive hacking and information gathering which is based on the source type, from where data is fetched.
(a) 6
(b) 5
(c) 4
(d) 3
I have been asked this question in an online interview.
Asked question is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security