Which two attacks could an attacker use during the penetrate phase of an attack? (Choose two.)
A.
buffer overflow
B.
ping scans
C.
modify configuration
D.
erase files
E.
install new code
F.
e-mail attachment
Which two attacks could an attacker use during the penetrate phase of an attack? (Choose two.)
Which two attacks could an attacker use during the penetrate phase of an attack? (Choose two.)
A.
buffer overflow
B.
ping scans
C.
modify configuration
D.
erase files
E.
install new code
F.
e-mail attachment