A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?
A . Trojan horse
B . Denial of Service (DoS)
C . Spoofing
D . Man-in-the-Middle (MITM)
Answer: A
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund