Once the attackers detect live systems in the target network, they try to find ________ in the detected live systems.

A closed ports
B unused ports
C open ports
D unnecessary ports


Answer: C open ports

Computer Science & Information Technology

You might also like to view...

A characteristic of defensive programming is:

a. readable code b. predictable results c. enforcement of function pre-conditions d. none of the above e. all of the above

Computer Science & Information Technology

A BPDU data packet lists the “Forward Delay” as 15 seconds. What information does this provide?

What will be an ideal response?

Computer Science & Information Technology

In the accompanying figure, ____ is used as a measurement.

A. megapixel B. gigabytes C. dpi D. hertz

Computer Science & Information Technology

For journalists probably the most important characteristic of the Web is its:

Computer Science & Information Technology