Which type of attack is characterized by exploitation of well-known weaknesses, use of ports that
are allowed through a firewall, and can never be completely eliminated?
A.
network reconnaissance
B.
application layer
C.
trust exploitation
D.
man-in-the-middle