A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

A. indirect
B. direct
C. software
D. hardware


Answer: B

Computer Science & Information Technology

You might also like to view...

Maps allocate keys to values and cannot contain duplicate keys, i.e., the key-to-value mapping is a __________ mapping.

a. many-to-many. b. many-to-one. c. one-to-many. d. one-to-one.

Computer Science & Information Technology

You can use a(n) ____ directory to locate a Web service that is appropriate for your needs.

A. object B. Internet search C. Web-based telephone D. UDDI

Computer Science & Information Technology

Which of the following is based off of the MD5 hash?

A. LANMAN B. NTLM C. NTLM2 D. SHA-1

Computer Science & Information Technology

What is the output of the following C++ code?  int list[5] = {0, 5, 10, 15, 20};int j;for (j = 1; j

A. 0 5 10 15 20 B. 5 10 15 20 0 C. 5 10 15 20 20 D. Code results in index out-of-bounds

Computer Science & Information Technology