When viewing IPS logs the administrator see systems all over the world scanning the network for servers with
port 22 open. The administrator concludes that this traffic is a(N):
A.
Risk
B.
Vulnerability
C.
Exploit
D.
Threat
When viewing IPS logs the administrator see systems all over the world scanning the network for servers with
port 22 open. The administrator concludes that this traffic is a(N):
When viewing IPS logs the administrator see systems all over the world scanning the network for servers with
port 22 open. The administrator concludes that this traffic is a(N):
A.
Risk
B.
Vulnerability
C.
Exploit
D.
Threat