Hackers look for ____ ports used for transmitting and sharing data over networks.

A. virtual
B. open
C. scanned
D. closed

Answer: A

Computer Science & Information Technology

You might also like to view...

Image maps stored on a server are easier to work with than client-side image maps

Indicate whether the statement is true or false

Computer Science & Information Technology

Which type of task should you add to an SSIS package if you need to perform operations on schema objects?

A. SQL Server B. workflow C. maintenance D. data preparation

Computer Science & Information Technology