Cisco Exam Questions

which two attack methods are typically used?

In reconnaissance attacks, which two attack methods are typically used? (Choose two.)

A.
Operating system and application fingerprinting

B.
Buffer overflows

C.
TCP/UDP port scanning and sweeping

D.
APR spoofing