John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Earleen
4 months agoWalton
4 months agoLashawna
4 months agoDorothy
4 months agoMartina
5 months agoTambra
5 months agoBrendan
5 months agoRoxane
5 months agoJerry
5 months agoElke
5 months agoBarb
5 months agoDomitila
5 months agoDerick
5 months agoKeith
5 months agoAron
5 months agoSusana
5 months ago