Which of the following would an attacker use to footprint a system?
A.
RADIUS
B.
Password cracker
C.
Port scanner
D.
Man-in-the-middle attack
Which of the following would an attacker use to footprint a system?
Which of the following would an attacker use to footprint a system?
A.
RADIUS
B.
Password cracker
C.
Port scanner
D.
Man-in-the-middle attack