What can an attacker use that gives them access to a computer program or service that circumvents normal security protections?
A. adware
B. backdoor
C. bot herder
D. botnet
Answer: B
You might also like to view...
The statement int[] list = new int[15]; creates list to be an array of 14 components because array index starts at 0.
Answer the following statement true (T) or false (F)
____ is the default name for a Windows Application project in Visual Studio.
A. WindowsProject1 B. WindowsApplication1 C. WindowsProgram1 D. WindowsLibrary1
One way of protecting Microsoft Outlook is to use a password for opening or modifying documents
Indicate whether the statement is true or false
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).
A. Penetration testing B. Penetration simulation C. Attack simulation D. Attack testing