which two attack methods are typically used?

In reconnaissance attacks, which two attack methods are typically used? (Choose two.)

In reconnaissance attacks, which two attack methods are typically used? (Choose two.)

A.
Operating system and application fingerprinting

B.
Buffer overflows

C.
TCP/UDP port scanning and sweeping

D.
APR spoofing



Leave a Reply 0

Your email address will not be published. Required fields are marked *