Which port numbers are most vulnerable to NetBIOS attacks?

a. 135 to 137
b. 389 to 1023
c. 135 to 139
d. 110 and 115


Answer: c. 135 to 139

Computer Science & Information Technology

You might also like to view...

The process of joining two strings string is called __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _________ searches a table for redundant data and suggests how to split the table into two or more related tables

Fill in the blank(s) with correct word

Computer Science & Information Technology

The best-fit allocation method keeps the free/busy lists organized by memory locations, low-order memory to high-order memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is true about a simple cycle?

a) it can pass through a vertex more than once b) it can not pass through a vertex more than once c) it begins at one vertex and ends at another d) it passes through only one vertex

Computer Science & Information Technology