Which two attacks could an attacker use during the probe phase of an attack?

Which two attacks could an attacker use during the probe phase of an attack? (Choose two.)

Which two attacks could an attacker use during the probe phase of an attack? (Choose two.)

A.
ping scans

B.
port scans

C.
install new code

D.
buffer overflow

E.
erase files



Leave a Reply 0

Your email address will not be published. Required fields are marked *