In which of the following attacks, a hacker uses a computer to call phone numbers in sequence until another computer answers?

a. War-driving
b. War-calling
c. War-dialing
d. War-flying


ANS: C

Computer Science & Information Technology

You might also like to view...

Prior to Java SE 8, Java supported three programming paradigms. Java SE 8 added ________.

a. procedural programming b. object-oriented programming c. generic programming d. functional programming.

Computer Science & Information Technology

What is Media queries?

What will be an ideal response?

Computer Science & Information Technology

A presentation ________ contains formatting, layouts, color schemes, and logos

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Control Source property for a calculated control may be either a(n) ____________________ or a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology