Which of the following vulnerability types would the type of hacker known as a script kiddie be MOST dangerous against?
A. Passwords written on the bottom of a keyboard
B. Unpatched exploitable Internet-facing services
C. Unencrypted backup tapes
D. Misplaced hardware token
Answer: B. Unpatched exploitable Internet-facing services
You might also like to view...
A ________ object specifies the line style used to draw a shape.
a) Brush b) Pencil c) Pen d) Stencil e) Line
Answer the following statements true (T) or false (F)
1. Non-template functions have a slight advantage in speed over template functions. 2. Iterators are objects that are similar to pointers. 3. When an item stored in a linked list is removed, all list items stored after it have to be moved down to plug up the hole. 4. Inserting an item into a linked list requires that all the items past the point of the insertion be shifted to make room for the new item. 5. In a non-empty list, there must be exactly one list item with no successor.
A comment that appears at the bottom of the page and contains the corresponding superscript number is called a _____.
A. footer B. note C. reference D. footnote
Hidden objects print when visible objects are printed.
Answer the following statement true (T) or false (F)