PdfPrep.com

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A . PCAP
B . tracert
C . running processes
D . hard drive configuration
E . applications

Answer: CE

Exit mobile version