One of the most common ways of gaining unauthorized access to a network-based computer is by looking for ____ ports.

A. closed
B. open
C. unlocked
D. scanned


Answer: B

Computer Science & Information Technology

You might also like to view...

If myVec has type vector what type does myVec.front() return?

What will be an ideal response?

Computer Science & Information Technology

Discuss the disadvantages of virtualization, and how those might be addressed.

What will be an ideal response?

Computer Science & Information Technology

To have effective port monitoring and see all traffic on the network, which of the following needs to be configured?

A) STP B) Root bridge C) Listening D) Mirroring

Computer Science & Information Technology

You can create hyperlinks to ____.

A. another Web page B. a specific location in the current workbook C. an e-mail address D. all of the above

Computer Science & Information Technology