Which of the following is an example of a remote access attack?

A) Using a Linux live CD to bypass the password
B) Using OphCrack to crack the password
C) Using an SQL injection
D) Using OphCrack


C) Using an SQL injection

Computer Science & Information Technology

You might also like to view...

Which of the following is a policy where a company allows an employee to bring their own device to work, but only if that device is from a list of pre-approved devices?

A) BYOD B) CYOD C) DYOD D) None of the above

Computer Science & Information Technology

What are the six goals of HCI? Describe each one.

What will be an ideal response?

Computer Science & Information Technology

Headaches, blurred vision, and a sore neck can be caused by poor placement of the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use Visible Analyst or the Repository Web page to view the Process repository entry for UPDATE PENDING COMPUTER ORDER.

What will be an ideal response?

Computer Science & Information Technology