Listening ports and processes are waiting for traffic. A hacker can sometimes exploit these open ports. If

Related Book For  answer-question

Principles Of Information Security

ISBN: 9780357506431

7th Edition

Authors: Michael E. Whitman, Herbert J. Mattord

Posted Date: