Administrators often overlook the ________ in terms of security. However, if queried properly, it can provide valuable network information to the attackers.

A. NTP server
B. cache file
C. virtual database
D. Active Directory


Answer: A. NTP server

Computer Science & Information Technology

You might also like to view...

The ____ statement performs the statements within it for each item in an array simultaneously.

A. for B. each in array together C. for in each D. while together

Computer Science & Information Technology

To capture musical themes from a MIDI instrument, you can use ____________________ software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Through ____ and monitors, an experienced security professional can identify a potential attack.

A. galleries B. displays C. screens D. logs

Computer Science & Information Technology

Which of the following is part of Visual Basic 2010?

A. Oracle Reports B. Google Reporting C. Crystal Reports D. Yahoo! Report Tools

Computer Science & Information Technology