Which port numbers are most vulnerable to NetBIOS attacks?
a. 135 to 137
b. 389 to 1023
c. 135 to 139
d. 110 and 115
Answer: c. 135 to 139
You might also like to view...
The process of joining two strings string is called __________.
Fill in the blank(s) with the appropriate word(s).
The _________ searches a table for redundant data and suggests how to split the table into two or more related tables
Fill in the blank(s) with correct word
The best-fit allocation method keeps the free/busy lists organized by memory locations, low-order memory to high-order memory.
Answer the following statement true (T) or false (F)
Which of the following is true about a simple cycle?
a) it can pass through a vertex more than once b) it can not pass through a vertex more than once c) it begins at one vertex and ends at another d) it passes through only one vertex