Once the attackers detect live systems in the target network, they try to find ________ in the detected live systems.

A closed ports
B unused ports
C open ports
D unnecessary ports

Answer: C open ports

Computer Science & Information Technology

You might also like to view...

________ is the type of RAM memory used most often in today's computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ____________________ is a random alphanumeric string generated by the session_start() function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology