Kim and Zach, attackers, use which of the following network scanners to see the protocols that are
being used? (Select TWO).
A.
IDS
B.
Packet sniffer
C.
Port scanners
D.
Malware scanner
E.
Ping sweep
Kim and Zach, attackers, use which of the following network scanners to see the protocols that are
being used? (Select TWO).
Kim and Zach, attackers, use which of the following network scanners to see the protocols that are
being used? (Select TWO).
A.
IDS
B.
Packet sniffer
C.
Port scanners
D.
Malware scanner
E.
Ping sweep