Multiple Choice
The use of automated software to locate computers that are vulnerable to unauthorized access is a port ____.
A) search
B) probe
C) dig
D) pry
Correct Answer:
Verified
Related Questions
Q84: Q85: Sharing files on a LAN or the Q86: Messaging and chat protocols include all of Q87: The _ protocol allows the transfer of