When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this
traffic is a(N):
A.
Risk
B.
Vulnerability
C.
Exploit
D.
Threat
When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this
traffic is a(N):
When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this
traffic is a(N):
A.
Risk
B.
Vulnerability
C.
Exploit
D.
Threat