When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this traffic is a(N):

A. Risk
B. Vulnerability
C. Exploit
D. Threat


Answer: D. Threat

Computer Science & Information Technology

You might also like to view...

What are some of the restrictions imposed by Windows 10 on the user name?

What will be an ideal response?

Computer Science & Information Technology

Identify the compiler errors and state what is needed to eliminate the error(s).

``` include Int HowOldAreYou(void); int main { int age; age = HowOldAreYou(void); } ```

Computer Science & Information Technology

____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What type of Windows Server is the most likely server to be targeted by a computer hacker?

A. File Server B. DNS Server C. DHCP Server D. Domain Controller

Computer Science & Information Technology