210-255 PDF | Which two options can be used by a threat actor to….

Question 4:

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A. PCAP
B. tracert
C. running processes
D. hard drive configuration
E. applications
Answer: C E

You may also like...