____ involves security audit personnel trying to hack into a network.
A. Distributed denial of service
B. Private peering
C. Penetration testing
D. Tunneling
Answer: C
You might also like to view...
An auditor has produced a findings report that cites the lack of separation of duties as a significant problem. Management should consider:
a. Separating development and production environments b. Outsourcing the indicated process c. Stop outsourcing the indicated process d. Examining the indicated process and reassigning duties among a greater number of individuals
The ________ tab is used when the user finds it easier to enter presentation text in a manner, which is similar to adding an outline in Word
Fill in the blank(s) with correct word
A file type developed by Microsoft that provides a visual image of a spreadsheet is a portible document format file
Indicate whether the statement is true or false
The item on which the mouse pointer is resting in the accompanying figure changes to reflect the tool currently selected on the ____.
a. Document panel
b. Tools panel
c. Options panel
d. context menu