Attackers use which of the following network scanners to see the protocols that are being used? (Select TWO).
A.
IDS
B.
Packet sniffer
C.
Port scanners
D.
Malware scanner
E.
Ping sweep
Attackers use which of the following network scanners to see the protocols that are being used? (Select TWO).
Attackers use which of the following network scanners to see the protocols that are being used? (Select TWO).
A.
IDS
B.
Packet sniffer
C.
Port scanners
D.
Malware scanner
E.
Ping sweep