Which standard feature can be exploited by an attacker to perform network reconnaissance?
A. IP-directed broadcast
B. maintenance operations ptotocol
C. ICMP redirects
D. source quench
Which standard feature can be exploited by an attacker to perform network reconnaissance?
A. IP-directed broadcast
B. maintenance operations ptotocol
C. ICMP redirects
D. source quench