Which of the following is a remote access attack?
a. Using Linux live CD to bypass the password
b. Using Ophcrack to crack the password
c. Using an SLQ injection
d. Calling tech support
ANS: C
You might also like to view...
To display the Query Design window, click the Query Design button, which is located on the ________ tab in the Queries group
A) Home B) Design C) Create D) Database Tools
A(n) _________ is a device on a wireless network used to grant network access to wireless devices. A. wireless access point B. wireless access organizer C. network access adapter D. network access switch
Fill in the blank(s) with the appropriate word(s).
You can press the period key to move the playhead backward one frame at a time.
Answer the following statement true (T) or false (F)
The term ________ refers to publishing personal information on the Web
A) desktop publishing B) instant message C) twitter D) blog