A system has been scanned for vulnerabilities and has been found to contain a number of
communication ports that have been opened without authority. To which of the following might this
system have been subjected?
A.
Trojan horse
B.
Denial of Service (DoS)
C.
Spoofing
D.
Man-in-the-Middle (MITM)