In which of the following attacks does a hacker use a computer to call phone numbers in sequence until another computer answers?
A) War-driving
B) War-calling
C) War-dialing
D) War-flying
C) War-dialing
Computer Science & Information Technology
You might also like to view...
________ is redistributing goods or products we own by sharing them.
A. Crowdfunding B. Social networking C. Crowdsourcing D. Collaborative consumption
Computer Science & Information Technology
If a URL doesn't specify a filename, the server returns the default ____ page.
A. main B. link C. catalog D. home
Computer Science & Information Technology
When creating an index, you must identify the ________ that will be used as index entries
A) bookmarks B) page numbers C) terms D) formats
Computer Science & Information Technology
A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.?
A. ?process flow diagram B. ?object model C. ?data flow diagram D. ?network model
Computer Science & Information Technology