In reconnaissance attacks, which two attack methods are typically used? (Choose two.)
A.
Operating system and application fingerprinting
B.
Buffer overflows
C.
TCP/UDP port scanning and sweeping
D.
APR spoofing
In reconnaissance attacks, which two attack methods are typically used? (Choose two.)
In reconnaissance attacks, which two attack methods are typically used? (Choose two.)
A.
Operating system and application fingerprinting
B.
Buffer overflows
C.
TCP/UDP port scanning and sweeping
D.
APR spoofing