One of the most common ways of gaining unauthorized access to a network-based computer is by looking for ____ ports.
A. closed
B. open
C. unlocked
D. scanned
Answer: B
Computer Science & Information Technology
You might also like to view...
You can add your own commonly misspelled words to the AutoCorrect list of words that is built into Word
Indicate whether the statement is true or false
Computer Science & Information Technology
The DATEDIFF function always presents the calculated time interval between two specific dates in number of days
Indicate whether the statement is true or false
Computer Science & Information Technology