Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
A. brute-force attack
B. spammer
C. worm
D. Trojan horse
Answer: A
You might also like to view...
________, indicated by braces on a data structure, must have a corresponding DO WHILE, DO UNTIL, or PERFORM UNTIL structured English statement.
A) Iteration B) Selection C) Movement D) Sequence
The ____ program allows for a Linux system to participate in a Windows network by sharing files and printers using SMB (Server Message Blocks) and CIFS (Common Internet File System) protocols.
A. Wimba B. Samba C. Winbind D. WINE
Describe the three levels of cache used by a processor.
What will be an ideal response?
The Children's Online Privacy Protection Act ("COPPA") was enacted to primarily prevent which of the following activities?
A. To prevent children from using a parent's credit card information without consent B. To protect the privacy of children under 18 years of age C. To protect children from malicious or abusive users of interactive online services D. To educate parents about the danger of the Internet