Which of the following threats corresponds with an attacker targeting specific employees of a company?
An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?