Certified Ethical Hacker (CEHv9) Questions and answers
93. Which of the following is a protocol specifically designed for transporting event messages?
94. It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data. Which of the following terms best matches the definition?