Which of the following is an example of a physical access attack?
A) Using a Linux live CD to bypass the password
B) Using cross-site scripting
C) Using an SQL injection
D) Using NS Auditor
A) Using a Linux live CD to bypass the password
You might also like to view...
How can you use ssh to find out who is logged in on a remote system?
What will be an ideal response?
Objects are containers for values and are names that reference objects.
Fill in the blank(s) with the appropriate word(s).
The Find and ________ tool searches for and changes indicated data within an Access database
Fill in the blank(s) with correct word
There are three basic categories of information that an Internet service provider can collect regarding its customers. Which of the following is not one of those categories?
a. Basic Subscriber Information b. Transactional History c. Financial Profile d. Customer generated content