Which four methods are used by hackers? (Choose four.)
A.
footprint analysis attack
B.
privilege escalation attack
C.
buffer Unicode attack
D.
front door attacks
E.
social engineering attack
F.
Trojan horse attack
Which four methods are used by hackers? (Choose four.)
Which four methods are used by hackers? (Choose four.)
A.
footprint analysis attack
B.
privilege escalation attack
C.
buffer Unicode attack
D.
front door attacks
E.
social engineering attack
F.
Trojan horse attack