An employee from the fire Marshall's office arrives to inspect the data center. The operator allows him to bypass the multi-factor authentication to enter the data center. Which of the following types of attacks may be underway?
A. Impersonation
B. Hoax
C. Tailgating
D. Spoofing
Answer: C. Tailgating
You might also like to view...
An array called aList contains integers 5, 3, 7, 2, 8. What are the contents of aList after the function call workOnArray (aList, 4), if and the definition of workOnArray is:
int workOnArray (int a[], int n) { if (n == 1) return a[0] + 3; else { a[n] = workOnArray (a, n-1); return 7; } } a) 5, 3, 8, 8, 8 b) 5, 6, 10, 5, 11 c) 5, 3, 8, 7, 7 d) 8, 6, 10, 5, 11
The following session shows the commands needed to perform the task. The tar archive is in the ~/labs.tar file.
What will be an ideal response?
In VBA a macro is called a ________
A) process B) function C) procedure D) subroutine
Microsoft ________ is most appropriate to use to create a memo for business use
A) Word B) Excel C) Access D) PowerPoint