Which of the following is a remote access attack?

a. Using Linux live CD to bypass the password
b. Using Ophcrack to crack the password
c. Using an SLQ injection
d. Calling tech support


ANS: C

Computer Science & Information Technology

You might also like to view...

To display the Query Design window, click the Query Design button, which is located on the ________ tab in the Queries group

A) Home B) Design C) Create D) Database Tools

Computer Science & Information Technology

A(n) _________ is a device on a wireless network used to grant network access to wireless devices. A. wireless access point B. wireless access organizer C. network access adapter D. network access switch

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can press the period key to move the playhead backward one frame at a time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The term ________ refers to publishing personal information on the Web

A) desktop publishing B) instant message C) twitter D) blog

Computer Science & Information Technology