A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?
A. Honeypot
B. Butt set
C. Spyware
D. Blue jacking
Answer: B. Butt set
Computer Science & Information Technology
You might also like to view...
Which IPsec component authenticates TCP/IP packets to ensure data integrity?
A. AH B. ESP C. IKE D. ISAKMP
Computer Science & Information Technology
A(n) ____ plan addresses the identification, classification, response, and recovery from an incident.
A. incident response B. disaster recovery C. attack profile D. business impact analysis
Computer Science & Information Technology
A chart is a graphic representation of data
Indicate whether the statement is true or false
Computer Science & Information Technology
This object is useful because it can give a different orientation for document text and can be placed anywhere in a document
a. Picture b. Text box c. Datasheet
Computer Science & Information Technology