In technical terms, ____ describes the points of risk regarding the penetration of a security defense.

A. security vulnerability
B. dictionary attack
C. password guessing
D. IPSec


Answer: A

Computer Science & Information Technology

You might also like to view...

Many kiosks have ____ devices for playing sound and video clips.

A. reference B. animation C. data D. multimedia

Computer Science & Information Technology

The latest versions of software manuals are often found on company Web sites

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is TRUE about Windows 8 apps?

A) To close a Windows 8 app, you must click the X or Close icon. B) When you move the pointer to the top of the Windows 8 screen, it turns to a double-arrow, and the app can be clicked and dragged to the bottom of the screen to be close. C) All Windows 8 apps that are not displayed on the screen continue to run in memory until you close the app. D) Windows suspends apps that are not displayed on the screen.

Computer Science & Information Technology

____ effectively removes restrictions on maximum program size.

A. Segmenting B. Virtual memory C. Shared memory D. Multithreading

Computer Science & Information Technology