One of the first techniques that malicious users try is to probe hosts to identify any __________ ports.

A. open
B. closed
C. blocked
D. locked


Answer: A

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 2-1Ethan is editing his project paper using Microsoft Word 2013. Please answer the questions below.Ethan wants to change the font in the entire document. To select all of the text in the document, on the _____ tab, he clicks Editing, Select, then Select All.

A. HOME B. INSERT C. PAGE LAYOUT D. VIEW

Computer Science & Information Technology

Connector tools connect shapes with a(n) ____________________ or arrow.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When the lock of a door fails and the door remains locked, it has a(n) fail-safe lock. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Why is it important to provide a specific statement of responsibility?

What will be an ideal response?

Computer Science & Information Technology