Which type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed through a firewall, and can never be completely eliminated?

Which type of attack is characterized by exploitation of well-known weaknesses, use of ports that
are allowed through a firewall, and can never be completely eliminated?

Which type of attack is characterized by exploitation of well-known weaknesses, use of ports that
are allowed through a firewall, and can never be completely eliminated?

A.
network reconnaissance

B.
application layer

C.
trust exploitation

D.
man-in-the-middle



Leave a Reply 0

Your email address will not be published. Required fields are marked *