Which two attack methods are typically used in reconnaissance attacks?

Which two attack methods are typically used in reconnaissance attacks? (Choose two.)

Which two attack methods are typically used in reconnaissance attacks? (Choose two.)

A.
TCP/UDP port scanning and sweeping

B.
ARP spoofing

C.
TCP SYN flooding

D.
operating system and application fingerprinting

E.
buffer overflows



Leave a Reply 0

Your email address will not be published. Required fields are marked *