Which of the following is the first step in any computer attack?

a. Performing a DoS attack
b. Actively collecting information about the system
c. Passive collection of information about the system
d. Port scanning


ANS: C

Computer Science & Information Technology

You might also like to view...

You can hide information entered by the user with a __________ component; by default, an asterisk (*) will be displayed for every character entered by the user.

a) JTextField b) JPassword c) JMaskedField d) JPasswordField

Computer Science & Information Technology

In the Declarations statement "Option Compare Database," Database determines how the procedure will ____ the data.

A. organize B. filter C. run D. sort

Computer Science & Information Technology

?Which of the following is a vendor of popular anti-virus software?

A. ?Microsoft B. ?Symantec C. ?McDonald's D. ?Bayer

Computer Science & Information Technology

In ____________________ organization, the order of the records is physically based on the content of the key field.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology