Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)
A . unplug network devices
B . packet sniffer
C . ping sweeps
D . port scans

Answer: BCD

Leave a Reply

Your email address will not be published.