Which of the following can be used by an attacker to footprint a system?
A.
Man-in-the-middle attack
B.
RADIUS
C.
Port scanner
D.
Password cracker
Which of the following can be used by an attacker to footprint a system?
Which of the following can be used by an attacker to footprint a system?
A.
Man-in-the-middle attack
B.
RADIUS
C.
Port scanner
D.
Password cracker