Which two attack methods are typically used in reconnaissance attacks? (Choose two.)
A.
TCP/UDP port scanning and sweeping
B.
ARP spoofing
C.
TCP SYN flooding
D.
operating system and application fingerprinting
E.
buffer overflows
Which two attack methods are typically used in reconnaissance attacks? (Choose two.)
Which two attack methods are typically used in reconnaissance attacks? (Choose two.)
A.
TCP/UDP port scanning and sweeping
B.
ARP spoofing
C.
TCP SYN flooding
D.
operating system and application fingerprinting
E.
buffer overflows