_________________ uses hard disk and optical or tape jukebox technology to offer continuous online backup functionality
__________________ is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
Every computer system has __________ TCP and ______________ UDP ports. The first _________ are said to be well-known ports.