PdfPrep.com

Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)

Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)
A . unplug network devices
B . packet sniffer
C . ping sweeps
D . port scans

Answer: BCD

Exit mobile version