An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt.Which of the following terms BEST describes the actor in this situation?

A. Script kiddie
B. Hacktivist
C. Cryptologist
D. Security auditor


Answer: A. Script kiddie

Computer Science & Information Technology

You might also like to view...

Some XML authors add all namespace declarations to the document's _______ element so that the namespace is available to all elements within the document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Random networks obey binomial distribution. However, for large-sized random networks with very low value of link addition probability, the degree distribution shifts from binomial to Poisson distribution. Prove this transition in degree distribution analytically.

What will be an ideal response?

Computer Science & Information Technology

The __________ specifies the instants in time at which the selection function is exercised.

A) ?decision mode ? B) ?medium-term scheduling C) ?ready state ? D) ?TAT

Computer Science & Information Technology

Which account type lets an individual use most of the capabilities of the computer but requires permission to make changes that affect other users?

A) guest account B) administrator account C) supervisor account D) standard user account

Computer Science & Information Technology