•
Question 16
A _________ has a hostile intent, possesses sophisticated skills, and may be interested
in financial gain. They represent the greatest threat to networks and information resources.
•
Question 17
A ___________ is a tool used to scan IP host devices for open ports that have been
enabled.
•
Question 18
What is meant by rootkit?
•
Question 19