The practice of searching the Internet for unprotected computers is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

port probe

Computer Science & Information Technology

You might also like to view...

The Charms pop up when you point the mouse to the ________ corner of the screen

A) bottom-left B) top-right C) bottom-right D) top-left

Computer Science & Information Technology

Three methods dominate IDPS detection methods: the ____________________-based approach, the statistical anomaly-based approach, and the stateful packet inspection approach.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology