Matching
1. Wetware a. a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmer is fired and not available to suppress action
2. Time bomb b. a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
3. Bit bucket c. an individual hired by a company to test its security systems by attempting to violate them
4. Brute force d. the final destination of discarded, lost, or destroyed data
5. Sneaker e. a term used to refer to humans operating computers (as opposed to hardware and software)
1. e
2. a
3. d
4. b
5. c
You might also like to view...
The "surrender ritual" describes the behavior of the police about to make a tactical entry to end a hostage crisis
a. True b. False
An officer should dress casually, so as not to look intimidating or threatening on the witness stand.
Answer the following statement true (T) or false (F)
As per Maryland v. Wilson (1997), police officers who have effected a traffic stop can choose to remove _______________ from the stopped vehicle to maximize personal safety
a. drivers b. animals c. passengers d. weapons
What is the least effective police strategy to prevent delinquency?
a. Undercover police in schools b. Engaging the community c. Saturation patrols d. Problem-oriented policing