Once the attackers detect live systems in the target network, they try to find ________ in the detected live systems.
A closed ports
B unused ports
C open ports
D unnecessary ports
Answer: C open ports
Computer Science & Information Technology
You might also like to view...
________ is the type of RAM memory used most often in today's computers
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n) ____________________ is a random alphanumeric string generated by the session_start() function.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology