Which of the following can be used by an attacker to footprint a system? seenagape 13 years ago Which of the following can be used by an attacker to footprint a system? A.Man-in-the-middle attack B.RADIUS C.Port scanner D.Password cracker ← Previous question Next question →