Which of the following is a weak spot or known place of attack on any common operating system, application, or service?

A. back door
B. hole
C. discovery
D. hash


Answer: B

Computer Science & Information Technology

You might also like to view...

Java provides the ____ block to perform "cleanup" operations, such as closing any files the program has opened.

A. try B. catch C. finally D. throw

Computer Science & Information Technology

The ____ command can be used to set time limits on soft quotas.

A. grpquota B. repquota C. edquota D. quotacheck

Computer Science & Information Technology

Which of the following is a valid variable name?

A. Sales Amt B. SalesAmt C. 1Sales D. Sales.Total

Computer Science & Information Technology

The Excel operator for division is ____.

A. / B. \ C. % D. ^

Computer Science & Information Technology