Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?

A. hole
B. exploit
C. break-in
D. attack


Answer: B

Computer Science & Information Technology

You might also like to view...

Each fact in a Prolog program is similar to a record in a database, but you can query a Prolog program's database by asking a question, called a(n) _______ in Prolog jargon.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

EX Case 5-1Maria's grandfather has agreed to help her invest her $2,000 savings account in the stock market. He asked that she create an Excel worksheet to track how her stocks are doing. Because he is coming over in a few days, she wants to update the worksheet. When beginning to create a formula that multiplies the current price of the stock by the number of shares, Maria would click the formula bar, then type a(n) ____.

A. = (equal sign) B. + (plus sign) C. & (ampersand) D. ! (exclamation point)

Computer Science & Information Technology

?Which of the following is NOT considered business intelligence practice??

A. ?Data extraction B. Visualization C. ?Analysis D. Transaction processing

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. An exact duplication of the hard drive B. Copies files that have changed since the last complete backup C. Backs up folders and files that are selected by hand D. Creates and stores a backup on an in-house network folder E. Backs up files on a secure server

Computer Science & Information Technology