What common term is used by security testing professionals to describe vulnerabilities in a network?

A. bytes
B. packets
C. bots
D. holes


Answer: D

Computer Science & Information Technology

You might also like to view...

_____ is a long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Including one or more if statements inside an existing if statement is called a(n) ____________________ if statement.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________________ algorithms follow millions (or billions) of light rays from their source to an object's surface and any subsequent reflections can produce truly lifelike images and take minutes or hours to render a single frame.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When a form field contains text that the user should not format, the online form uses a(n) ____ content control for the data entry field.

A. rich text B. alphanumeric C. format-free D. plain text

Computer Science & Information Technology