Once the attackers detect live systems in the target network, they try to find ________ in the detected live systems.
A closed ports
B unused ports
C open ports
D unnecessary ports
Answer: C open ports
Computer Science & Information Technology
You might also like to view...
A characteristic of defensive programming is:
a. readable code b. predictable results c. enforcement of function pre-conditions d. none of the above e. all of the above
Computer Science & Information Technology
A BPDU data packet lists the “Forward Delay” as 15 seconds. What information does this provide?
What will be an ideal response?
Computer Science & Information Technology
In the accompanying figure, ____ is used as a measurement.
A. megapixel B. gigabytes C. dpi D. hertz
Computer Science & Information Technology
For journalists probably the most important characteristic of the Web is its:
Computer Science & Information Technology