In which of the following attacks, a hacker uses a computer to call phone numbers in sequence until another computer answers?
a. War-driving
b. War-calling
c. War-dialing
d. War-flying
ANS: C
Computer Science & Information Technology
You might also like to view...
Prior to Java SE 8, Java supported three programming paradigms. Java SE 8 added ________.
a. procedural programming b. object-oriented programming c. generic programming d. functional programming.
Computer Science & Information Technology
What is Media queries?
What will be an ideal response?
Computer Science & Information Technology
A presentation ________ contains formatting, layouts, color schemes, and logos
Fill in the blank(s) with correct word
Computer Science & Information Technology
The Control Source property for a calculated control may be either a(n) ____________________ or a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology