Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Respuesta :

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation: