Which two of the following might be considered attack surfaces in the network environment? (Choose two.)
A. open ports
B. privacy settings
C. use of SSH
D. use of Telnet
Which two of the following might be considered attack surfaces in the network environment? (Choose two.)
A. open ports
B. privacy settings
C. use of SSH
D. use of Telnet