A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.
A. indirect
B. direct
C. software
D. hardware
Answer: B
Computer Science & Information Technology
You might also like to view...
Maps allocate keys to values and cannot contain duplicate keys, i.e., the key-to-value mapping is a __________ mapping.
a. many-to-many. b. many-to-one. c. one-to-many. d. one-to-one.
Computer Science & Information Technology
You can use a(n) ____ directory to locate a Web service that is appropriate for your needs.
A. object B. Internet search C. Web-based telephone D. UDDI
Computer Science & Information Technology
Which of the following is based off of the MD5 hash?
A. LANMAN B. NTLM C. NTLM2 D. SHA-1
Computer Science & Information Technology
What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20};int j;for (j = 1; j
A. 0 5 10 15 20 B. 5 10 15 20 0 C. 5 10 15 20 20 D. Code results in index out-of-bounds
Computer Science & Information Technology