which two attack methods are typically used? networkmanagers 13 years ago In reconnaissance attacks, which two attack methods are typically used? (Choose two.) A.Operating system and application fingerprinting B.Buffer overflows C.TCP/UDP port scanning and sweeping D.APR spoofing ← Previous question Next question →