Which term is best described as an attack that relies on the gullibility of people?

A. malicious code
B. script kiddie
C. back door
D. social engineering


Answer: D

Computer Science & Information Technology

You might also like to view...

Use JSP scriptlets to create the database Connection and Statement objects for the Road Sign Review application that you started developing in Tutorial 30. The roadsigns database has the table signs, which contains three columns—id, name and sign. The id field is a unique number to identify a road sign. The name field is a string that specifies the name of the road sign. The sign field is a string that specifies an image file name of the road sign, such as "sign01.png".

a) Opening roadSigns.jsp. Open the roadSigns.jsp file that you created. b) Importing classes from java.sql for use in the JSP. Copy lines 4–5 and insert them in line 4 of roadSigns.jsp. c) Starting a JSP scriptlet. In the roadSigns.jsp source code, after the h1 HTML ele- ment, start a JSP scriptlet. In the scriptlet, start a try block. d) Adding a Connection to the database. In the try block, specify the database loca- tion with value "C:\\Examples\\Tutorial31\\Exercises\\Databases", load the database driver class and connect to the roadsigns database (jdbc:db2j:road- signs). [Note: If you copied and pasted the Tutorial31 directory on the CD to a directory other than C:\Examples, then replace C:\\Examples with the directory to where you pasted Tutorial31.] ) Creating a Statement and executing a query that retrieves road sign information from the database. After the database connection is created successfully, create a Statement object that will be used to execute an SQL query. Execute a query that gets all the road signs from the database. f) Ending the scriptlet. In the roadSigns.jsp source code, end the scriptlet started in Step c so that literal HTML markup can be placed in the response to the client. g) Adding a second JSP scriptlet. In the roadSigns.jsp source code, after the img HTML element that will display the last road sign image retrieved from the database, add a second JSP scriptlet that will close the database connection, end the try block and display the SQLException error message if an exception occurs. h) Saving the file. Save your modified file roadsigns.jsp. i) Copying the roadSigns.jsp file to the Tomcat webapps directory. Copy your updated roadSigns.jsp file and paste it into the C:\Program Files\ Apache Group\Tomcat 4.1\webapps\RoadSign directory. j) Copying the database JAR files to the Road Signs Web application. The informa- tion tier for the Road Signs Web application uses the Cloudscape database. You need to copy the db2j.jar and license.jar files to the C:\Program Files\ Apache Group\Tomcat 4.1\webapps\RoadSign\WEB-INF\lib directory. The db2j.jar and license.jar files are located in the C:\Cloudscape_5.1\lib direc- tory. In Tutorial 26, if you installed Cloudscape in a directory other than C:\Cloudscape_5.1, replace C:\Cloudscape_5.1 with your Cloudscape installa- tion. k) Starting Tomcat. Select Start > Programs > Apache Tomcat 4.1 > Start Tomcat to start the Tomcat server. l) Testing the application. Open a Web browser and enter the URLs http:// localhost:8080/RoadSign/roadSigns.jsp to test the application. m)Stopping Tomcat. Select Start > Programs > Apache Tomcat 4.1 > Stop Tomcat to stop the Tomcat server.

Computer Science & Information Technology

The ________ controls the minimum, maximum, and incremental values on the value axis

Fill in the blank(s) with correct word

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?

A. No central administrator is present on the Internet. B. It is usually the responsibility of the network administrators to take measures to protect a network from security risks. C. Information kept on an organization's premises has a higher security risk than information transmitted over networks. D. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

Computer Science & Information Technology

What is an evaluation model? How would you create a weighted evaluation model?

What will be an ideal response?

Computer Science & Information Technology