Which of the following is an example of a physical access attack?

A) Using a Linux live CD to bypass the password
B) Using cross-site scripting
C) Using an SQL injection
D) Using NS Auditor


A) Using a Linux live CD to bypass the password

Computer Science & Information Technology

You might also like to view...

How can you use ssh to find out who is logged in on a remote system?

What will be an ideal response?

Computer Science & Information Technology

Objects are containers for values and are names that reference objects.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Find and ________ tool searches for and changes indicated data within an Access database

Fill in the blank(s) with correct word

Computer Science & Information Technology

There are three basic categories of information that an Internet service provider can collect regarding its customers. Which of the following is not one of those categories?

a. Basic Subscriber Information b. Transactional History c. Financial Profile d. Customer generated content

Computer Science & Information Technology