In which of the following attacks does a hacker use a computer to call phone numbers in sequence until another computer answers?

A) War-driving
B) War-calling
C) War-dialing
D) War-flying


C) War-dialing

Computer Science & Information Technology

You might also like to view...

________ is redistributing goods or products we own by sharing them.

A. Crowdfunding B. Social networking C. Crowdsourcing D. Collaborative consumption

Computer Science & Information Technology

If a URL doesn't specify a filename, the server returns the default ____ page.

A. main B. link C. catalog D. home

Computer Science & Information Technology

When creating an index, you must identify the ________ that will be used as index entries

A) bookmarks B) page numbers C) terms D) formats

Computer Science & Information Technology

A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.?

A. ?process flow diagram B. ?object model C. ?data flow diagram D. ?network model

Computer Science & Information Technology