Which of the following was identified as a software attack in the text?
a. counterfeiting products
b. brute force
c. drive-by-downloads
d. denial-of-service
d. denial-of-service
You might also like to view...
Rough surfaces usually result in stains with what type of spatter?
a. Forward b. Back c. Blow-back d. Satellite
Emiliano Zapata fought passionately for the restoration of confiscated land; what was the name of his plan to reclaim land?
a. Plan Zapata b. Plan Ayala c. Plan Columbia d. Plan Aruba
Sutherland's research on crime led him to dispute the notion that crime was a function of the inherent inadequacy of people in the lower classes.
Answer the following statement true (T) or false (F)
Which of the following is one way in which prisons in the southern U.S. differed from those in the northeast?
a. Southern prisons used the contract labor system. b. The use of reformatories began in the south, then spread to the northeast. c. The lease system was frequently used in southern prisons. d. The first prisons for women were in the south. e. The south built many more prisons than the northern states following the Civil War.