Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A . PCAP
B . tracert
C . running processes
D . hard drive configuration
E . applications
Answer: CE
Latest 210-255 Dumps Valid Version with 170 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund