Which of the following is sometimes called a backdoor?

A. Maintenance hook
B. Padded cell
C. SAML
D. Reference monitor


A A maintenance hook is sometimes called a backdoor.

Computer Science & Information Technology

You might also like to view...

Which of the following function invocations is an approximation of PI

A. atan(-1); B. acos(-1); C. sin(-1); D. cos(-1);

Computer Science & Information Technology

Which technology allows networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally?

A. DNS B. IP gateway C. NAT D. VoIP

Computer Science & Information Technology

Which of the following is NOT true regarding calculated fields?

A) The result of the calculated field is displayed each time you run the query. B) A calculated field can be added to a query using the fields in the query or even fields in another table or query in the database. C) The calculation can use a combination of numbers and field values, which allows you flexibility in how you perform the calculation. D) A calculated field is stored in the table once the query is saved.

Computer Science & Information Technology

In a signature-based monitoring environment, network traffic is analyzed for predetermined attack patterns

Indicate whether the statement is true or false

Computer Science & Information Technology