When viewing IPS logs the administrator see systems all over the world scanning the network for servers
with port 22 open. The administrator concludes that this traffic is a(N):
A.
Risk
B.
Vulnerability
C.
Exploit
D.
Threat
When viewing IPS logs the administrator see systems all over the world scanning the network for servers
with port 22 open. The administrator concludes that this traffic is a(N):
When viewing IPS logs the administrator see systems all over the world scanning the network for servers
with port 22 open. The administrator concludes that this traffic is a(N):
A.
Risk
B.
Vulnerability
C.
Exploit
D.
Threat