A(n) ____________________ can be used by hackers to look for unintentionally opened ports that might make a system vulnerable to attack.

Fill in the blank(s) with the appropriate word(s).

port scanner

Computer Science & Information Technology

You might also like to view...

When you use an AND filter in a search, how does it affect your search results?

A) it increases your search results B) it has no effect on your search results C) it search more locations D) it narrows your search results

Computer Science & Information Technology

Sorting Text A to Z

A) arranges data in alphabetical order. B) displays data in chronological order, oldest to newest. C) arranges values (numbers) in sequential order. D) is the process of displaying only records that meet specific conditions.

Computer Science & Information Technology