ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 104 - CISSP discussion

Report
Export

A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?

A.
Trojan horse
Answers
A.
Trojan horse
B.
Denial of Service (DoS)
Answers
B.
Denial of Service (DoS)
C.
Spoofing
Answers
C.
Spoofing
D.
Man-in-the-Middle (MITM)
Answers
D.
Man-in-the-Middle (MITM)
Suggested answer: A
asked 18/09/2024
Robert McConnell
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first