Which two options can be used by a threat actor to determine the role of a server? (Choose two.)

Posted by: Pdfprep Category: 210-255 Tags: , ,

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A . PCAP
B . tracert
C . running processes
D . hard drive configuration
E . applications

Answer: CE

Leave a Reply

Your email address will not be published.