问题:
A . Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B . Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
C . Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
D . Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
E . Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
F . Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.
● 参考解析
本题暂无解析
相关内容
相关标签