____ is a creative act that seeks to exploit security vulnerabilities.

A. Social engineering
B. White box testing
C. Network testing
D. Penetration testing


Answer: D

Computer Science & Information Technology

You might also like to view...

A ________ box includes an arrow that when clicked displays a list of user selectable items

A) dialog B) drop-down C) pop-up D) combo

Computer Science & Information Technology

If the content of a Web page template section does not change unless the include file is modified, it is called a ____ section.

A. static B. dynamic C. include D. constant

Computer Science & Information Technology

Critical Thinking QuestionsCase 2-1Your friend Riley knows that you have a lot of experience with proofreading works cited pages, as you have a background from your time as a graduate student and now as a professional researcher. Riley brings to you the research paper on which she is currently working. Which of the following is a correct and complete citation for a book? a. Connors, Jack. Dreaming of Jeannie. 4th edition. Volume 2. 2010.b. Santos, Matthew, and Joshua Lyman. How to Run (and Win) a Presidential Campaign. Houston: GOP Publishing, 2011.c. Shelly, Gary B. "How a GPS Works." Computing in Today's World March 2011: 34-42.d. Hutton, Laura. Effective Management for the 21st Century. Albuquerque: Manhattan Publishers.

What will be an ideal response?

Computer Science & Information Technology

An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?

A. Zero day B. Directory traversal C. Logic bomb D. Session hijacking

Computer Science & Information Technology