Which of the following refers to the unauthorized attempt to gain access to information about a system?

a. clickjacking
b. baud
c. banner grabbing
d. probe


Answer: d

Computer Science & Information Technology

You might also like to view...

How many finalizers can a class have?

A. zero B. one C. two D. Any number

Computer Science & Information Technology

In Visual Basic, a(n) ________ is an action that an object can perform while the application is running

A) event B) property C) characteristic D) method

Computer Science & Information Technology

The Solver add-in is a companion to the Excel program that helps you calculate complex what-if analyses called ____.

A. models B. hypotheses C. properties D. conjectures

Computer Science & Information Technology

You can think of the DOM as a hierarchical arrangement of the content of an HTML document into a tree-like structure, which is known as a DOM root. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology