A buffer overflow in MicroSoft Windows 2000/XP Local Security Authority Subsystem Service was exploited by the _________ .

A. Aleph One B. Sasser worm

C. Slammer worm D. none of the above


B. Sasser worm

Computer Science & Information Technology

You might also like to view...

You can adjust column widths while in _____ view.

A. Page Layout B. Review C. Page Preview D. Page Setup

Computer Science & Information Technology

Choose the option below that best describes how a website owner can obtain a digital certificate.

a. Digital Certificates are automatically created when you register for a domain name b. Contact a certificate authority and apply for a digital certificate c. Digital Certificates are automatically created when you are listed in a search engine d. Digital Certificates are automatically created when you obtain a merchant account

Computer Science & Information Technology

Which of the following does NOT open when the lower portion of a split button is clicked?

A) A gallery B) A list C) A menu D) A layout

Computer Science & Information Technology

A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells.

A. relational B. object-oriented C. multidimensional D. hierarchical

Computer Science & Information Technology