A security hole is a(n):

a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location
c. packet-level firewall
d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution
e. ANI system


Ans: a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

Computer Science & Information Technology

You might also like to view...

You can use the ____ command to fix problems in the file system.

A. fdisk B. traceroute C. ping D. tune2fs

Computer Science & Information Technology

Match the following terms to their meanings:

I. table II. bulleted list III. numbered list IV. RAM V. disk A. consists of computer chips mounted inside of the computer case B. lists information in column-and-row format C. magnetic media D. use when there is no particular order to the items listed E. use when there is an order to the items listed

Computer Science & Information Technology

When formatting text, a careless color choice may elicit the incorrect psychological response.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A class houses the ________ that perform the class’s tasks.

a. methods. b. functions. c. procedures. d. None of the above.

Computer Science & Information Technology