which two attack methods are typically used? seenagape 9 years ago In reconnaissance attacks, which two attack methods are typically used? (Choose two.) A. Operating system and application fingerprinting B. Buffer overflows C. TCP/UDP port scanning and sweeping D. APR spoofing ← Previous question Next question →