Non-essential services are often appealing to attackers because non-essential services: (Select
TWO)
A.
consume less bandwidth
B.
decrease the surface area for the attack
C.
sustain attacks that go unnoticed
D.
provide root level access
E.
are not visible to an IDS
F.
are not typically configured correctly or secured