As a result of ____, data can be stolen or altered.

A. extrusion
B. invasion
C. intrusion
D. port scanning


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is not a primitive type?

a. char b. float c. String d. int

Computer Science & Information Technology

To run an application in Visual Studio, press the ____________ button on the keyboard or click the Start Debugging button on the toolbar.

a. Enter b. F5 c. Tab d. Shift

Computer Science & Information Technology

You can set a keyboard shortcut key combination for executing a macro with an option in the Record Macro dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____.

A. ?MILNET B. ?NSFnet C. ?CampusNET D. ?DoDNET

Computer Science & Information Technology