Which of the following is a weak spot or known place of attack on any common operating system, application, or service?
A. back door
B. hole
C. discovery
D. hash
Answer: B
Computer Science & Information Technology
You might also like to view...
Java provides the ____ block to perform "cleanup" operations, such as closing any files the program has opened.
A. try B. catch C. finally D. throw
Computer Science & Information Technology
The ____ command can be used to set time limits on soft quotas.
A. grpquota B. repquota C. edquota D. quotacheck
Computer Science & Information Technology
Which of the following is a valid variable name?
A. Sales Amt B. SalesAmt C. 1Sales D. Sales.Total
Computer Science & Information Technology
The Excel operator for division is ____.
A. / B. \ C. % D. ^
Computer Science & Information Technology