Hackers look for ____ ports used for transmitting and sharing data over networks.
A. virtual
B. open
C. scanned
D. closed
Answer: A
Computer Science & Information Technology
You might also like to view...
Image maps stored on a server are easier to work with than client-side image maps
Indicate whether the statement is true or false
Computer Science & Information Technology
Which type of task should you add to an SSIS package if you need to perform operations on schema objects?
A. SQL Server B. workflow C. maintenance D. data preparation
Computer Science & Information Technology