Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command. How must the engineer interpret the results?
Which metric is used to capture the level of access needed to launch a successful attack?
Which security principle requires more than one person is required to perform a critical task?
How does an attack surface differ from an attack vector?