Which of the following is the first step in any computer attack?
a. Performing a DoS attack
b. Actively collecting information about the system
c. Passive collection of information about the system
d. Port scanning
ANS: C
You might also like to view...
You can hide information entered by the user with a __________ component; by default, an asterisk (*) will be displayed for every character entered by the user.
a) JTextField b) JPassword c) JMaskedField d) JPasswordField
In the Declarations statement "Option Compare Database," Database determines how the procedure will ____ the data.
A. organize B. filter C. run D. sort
?Which of the following is a vendor of popular anti-virus software?
A. ?Microsoft B. ?Symantec C. ?McDonald's D. ?Bayer
In ____________________ organization, the order of the records is physically based on the content of the key field.
Fill in the blank(s) with the appropriate word(s).