An example of a(n) ____ reconnaissance attack is a user who utilizes tools such as a network sniffer to obtain information about a system or network infrastructure.

A. active
B. passive
C. dynamic
D. static


Answer: B

Computer Science & Information Technology

You might also like to view...

Function________returns the pid of the currently executing process.

a) os.pid. b) os.getpid. c) os.showpid.

Computer Science & Information Technology

To add entries to iDiary you would

a. modify the XML file b. modify the XSL file c. make changes to both files d. once created the file cannot be changed

Computer Science & Information Technology

The ____ operator is used to concatenate two strings.

A. & B. # C. @ D. +

Computer Science & Information Technology

You open the Slice Options dialog box by double-clicking a slice with the Slice Select tool.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology