Why is it unacceptable to connect an unprotected system to the Internet for short periods of time? Which of the following software packages is a common DNS server that is the frequent subject of vulnerability reports? a. Sendmail b. Inetd c. RARP d. Gopher e. BIND Analysis of can help you review previously successful attacks and implement appropriate countermeasures to prevent their recurrence.