Which of the following can an attacker use to gather information on a system without having a user ID or password?
A.
NAT
B.
DNS poisoning
C.
Null session
D.
Spoofing
Which of the following can an attacker use to gather information on a system without having a user ID or password?
Which of the following can an attacker use to gather information on a system without having a user ID or password?
A.
NAT
B.
DNS poisoning
C.
Null session
D.
Spoofing