Which of the following serves the purpose of finding out what you have and what is vulnerable?

A. reconnaissance
B. covering-up
C. session hijacking
D. packet sniffing


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the default data type when creating an Access table?

A) Text B) Short text C) Long text D) Number

Computer Science & Information Technology

When qualifying an incident as a computer crime, which of the following characteristics would not be considered a valid description?

a. The data in the computer are the objects of the act. b. The computer is the instrument or the tool of the act. c. The computer is one of the objects stolen during a burglary. d. The computer is the target of an act.

Computer Science & Information Technology

The ____ option of the SizeMode property of the PictureBox object will increase or decrease the size of the PictureBox object to accommodate the size of the image.

A. CenterImage B. Normal C. AutoSize D. Zoom

Computer Science & Information Technology

Match the following desired actions with the method used to accomplish those actions:I.Add a title and formatting to a document in Word from data in AccessII.Add data to a table from a text fileIII.Use a table from one database in another databaseIV.Make data in a spreadsheet available to AccessV.Add various files to one field in AccessA.Import a text fileB.Add an attachment fieldC.Export to WordD.Export an Access objectE.Import from Excel

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology