____ involves security audit personnel trying to hack into a network.

A. Distributed denial of service
B. Private peering
C. Penetration testing
D. Tunneling


Answer: C

Computer Science & Information Technology

You might also like to view...

An auditor has produced a findings report that cites the lack of separation of duties as a significant problem. Management should consider:

a. Separating development and production environments b. Outsourcing the indicated process c. Stop outsourcing the indicated process d. Examining the indicated process and reassigning duties among a greater number of individuals

Computer Science & Information Technology

The ________ tab is used when the user finds it easier to enter presentation text in a manner, which is similar to adding an outline in Word

Fill in the blank(s) with correct word

Computer Science & Information Technology

A file type developed by Microsoft that provides a visual image of a spreadsheet is a portible document format file

Indicate whether the statement is true or false

Computer Science & Information Technology

The item on which the mouse pointer is resting in the accompanying figure changes to reflect the tool currently selected on the ____.



a. Document panel
b. Tools panel
c. Options panel
d. context menu

Computer Science & Information Technology