A. Access attack, using a scanner
B. Reconnaissance attack, using a sniffer
C. Access attack, using phishing
D. Reconnaissance attack, using a crasher
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here