One of the most common ways of gaining unauthorized access to a network-based computer is by looking for ____ ports.
A. closed
B. open
C. unlocked
D. scanned
Answer: B
Computer Science & Information Technology
You might also like to view...
If myVec has type vector
What will be an ideal response?
Computer Science & Information Technology
Discuss the disadvantages of virtualization, and how those might be addressed.
What will be an ideal response?
Computer Science & Information Technology
To have effective port monitoring and see all traffic on the network, which of the following needs to be configured?
A) STP B) Root bridge C) Listening D) Mirroring
Computer Science & Information Technology
You can create hyperlinks to ____.
A. another Web page B. a specific location in the current workbook C. an e-mail address D. all of the above
Computer Science & Information Technology