In technical terms, ____ describes the points of risk regarding the penetration of a security defense.
A. security vulnerability
B. dictionary attack
C. password guessing
D. IPSec
Answer: A
You might also like to view...
Many kiosks have ____ devices for playing sound and video clips.
A. reference B. animation C. data D. multimedia
The latest versions of software manuals are often found on company Web sites
Indicate whether the statement is true or false
Which of the following is TRUE about Windows 8 apps?
A) To close a Windows 8 app, you must click the X or Close icon. B) When you move the pointer to the top of the Windows 8 screen, it turns to a double-arrow, and the app can be clicked and dragged to the bottom of the screen to be close. C) All Windows 8 apps that are not displayed on the screen continue to run in memory until you close the app. D) Windows suspends apps that are not displayed on the screen.
____ effectively removes restrictions on maximum program size.
A. Segmenting B. Virtual memory C. Shared memory D. Multithreading