List of questions
Related questions
Question 104 - CISSP discussion
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?
A.
Trojan horse
B.
Denial of Service (DoS)
C.
Spoofing
D.
Man-in-the-Middle (MITM)
Your answer:
0 comments
Sorted by
Leave a comment first