which of the following might this system have been subjected?

A system has been scanned for vulnerabilities and has been found to contain a number of
communication ports that have been opened without authority. To which of the following might this
system have been subjected?

A system has been scanned for vulnerabilities and has been found to contain a number of
communication ports that have been opened without authority. To which of the following might this
system have been subjected?

A.
Trojan horse

B.
Denial of Service (DoS)

C.
Spoofing

D.
Man-in-the-Middle (MITM)



Leave a Reply 0

Your email address will not be published. Required fields are marked *