A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?

A. Honeypot
B. Butt set
C. Spyware
D. Blue jacking


Answer: B. Butt set

Computer Science & Information Technology

You might also like to view...

Which IPsec component authenticates TCP/IP packets to ensure data integrity?

A. AH B. ESP C. IKE D. ISAKMP

Computer Science & Information Technology

A(n) ____ plan addresses the identification, classification, response, and recovery from an incident.

A. incident response B. disaster recovery C. attack profile D. business impact analysis

Computer Science & Information Technology

A chart is a graphic representation of data

Indicate whether the statement is true or false

Computer Science & Information Technology

This object is useful because it can give a different orientation for document text and can be placed anywhere in a document

a. Picture b. Text box c. Datasheet

Computer Science & Information Technology