Attackers use which of the following network scanners to see the protocols that are being used? (Select TWO)

Attackers use which of the following network scanners to see the protocols that are being used? (Select TWO).

Attackers use which of the following network scanners to see the protocols that are being used? (Select TWO).

A.
IDS

B.
Packet sniffer

C.
Port scanners

D.
Malware scanner

E.
Ping sweep



Leave a Reply 0

Your email address will not be published. Required fields are marked *