Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)
A. unplug network devices
B. packet sniffer
C. ping sweeps
D. port scans
Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)
A. unplug network devices
B. packet sniffer
C. ping sweeps
D. port scans