With the increasing development of network, various network attacks appear. Which statement best describes the relationships between the attack method and the result?
A.
Ping Sweep – PG1 and PG3
Port Scan – PG2, PG4 and PG5
B.
Ping Sweep – PG2 and PG4
Port Scan – PG1, PG3 and PG5
C.
Ping Sweep – PG1 and PG5
Port Scan – PG2, PG3 and PG4
D.
Ping Sweep – PG2 and PG3
Port Scan – PG1, PG4 and PG5
I choose