Which two options can be used by a threat actor to determine the role of a server? (Choose two.)

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A . PCAP
B . tracert
C . running processes
D . hard drive configuration
E . applications

Answer: CE

Latest 210-255 Dumps Valid Version with 170 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments