When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this traffic is a(N):
A. Risk
B. Vulnerability
C. Exploit
D. Threat
Answer: D. Threat
You might also like to view...
What are some of the restrictions imposed by Windows 10 on the user name?
What will be an ideal response?
Identify the compiler errors and state what is needed to eliminate the error(s).
```
include
____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
Fill in the blank(s) with the appropriate word(s).
What type of Windows Server is the most likely server to be targeted by a computer hacker?
A. File Server B. DNS Server C. DHCP Server D. Domain Controller