Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

A. brute-force attack
B. spammer
C. worm
D. Trojan horse


Answer: A

Computer Science & Information Technology

You might also like to view...

________, indicated by braces on a data structure, must have a corresponding DO WHILE, DO UNTIL, or PERFORM UNTIL structured English statement.

A) Iteration B) Selection C) Movement D) Sequence

Computer Science & Information Technology

The ____ program allows for a Linux system to participate in a Windows network by sharing files and printers using SMB (Server Message Blocks) and CIFS (Common Internet File System) protocols.

A. Wimba B. Samba C. Winbind D. WINE

Computer Science & Information Technology

Describe the three levels of cache used by a processor.

What will be an ideal response?

Computer Science & Information Technology

The Children's Online Privacy Protection Act ("COPPA") was enacted to primarily prevent which of the following activities?

A. To prevent children from using a parent's credit card information without consent B. To protect the privacy of children under 18 years of age C. To protect children from malicious or abusive users of interactive online services D. To educate parents about the danger of the Internet

Computer Science & Information Technology