A(n) _____ is an attack that takes advantage of a vulnerability.
A. proxy
B. exploit
C. firewall
D. archive
Answer: B
You might also like to view...
_____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant.
A. Secure Sockets Layer (SSL) B. Card Verification Number C. Virtual private network (VPN) D. Payment Card Industry (PCI)
Lines, arrows, stars, banners, ovals, and rectangles are examples of ________ that are used to illustrate an idea, a process, or a workflow
A) clips B) shapes C) crops D) headers
The best use for linking text boxes is to create a:
A) Newsletter. B) Brochure. C) Flyer. D) Booklet.
Read the following sentence and key the correct terminal punctuation mark in the blank.You can cross the English Channel by ferry or by rail_____?
Fill in the blank(s) with the appropriate word(s).