One of the most common ways of gaining unauthorized access to a network-based computer is by looking for ____ ports.

A. closed
B. open
C. unlocked
D. scanned

Answer: B

Computer Science & Information Technology

You might also like to view...

You can add your own commonly misspelled words to the AutoCorrect list of words that is built into Word

Indicate whether the statement is true or false

Computer Science & Information Technology

The DATEDIFF function always presents the calculated time interval between two specific dates in number of days

Indicate whether the statement is true or false

Computer Science & Information Technology