Which two attacks could an attacker use during the probe phase of an attack? seenagape 10 years ago Which two attacks could an attacker use during the probe phase of an attack? (Choose two.) A. ping scans B. port scans C. install new code D. buffer overflow E. erase files ← Previous question Next question →