Which of the following is a way to get around a firewall to intrude into a secure network from a
remote location?
A.
Modem banks
B.
Identified network topology
C.
Active ports
D.
Active IP services
Which of the following is a way to get around a firewall to intrude into a secure network from a
remote location?
Which of the following is a way to get around a firewall to intrude into a secure network from a
remote location?
A.
Modem banks
B.
Identified network topology
C.
Active ports
D.
Active IP services