Which of the following can be used by an attacker to footprint a system?

Which of the following can be used by an attacker to footprint a system?

Which of the following can be used by an attacker to footprint a system?

A.
Man-in-the-middle attack

B.
RADIUS

C.
Port scanner

D.
Password cracker



Leave a Reply 0

Your email address will not be published. Required fields are marked *