An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of error or system response to use to make inferences about the system or environment.

A. active
B. passive
C. dynamic
D. static


Answer: A

Computer Science & Information Technology

You might also like to view...

What is pointer swizzling? Discuss the different approaches to pointer swizzling.

What will be an ideal response?

Computer Science & Information Technology

Useful data is when information is converted into a meaningful format

Indicate whether the statement is true or false

Computer Science & Information Technology

What training should programmers who do custom programming have?

A. Programmers need to be trained in secure programming both in general and for their particular language and application. B. Programmers need to be trained in secure programming for their particular language and application only. C. Programmers don't need any security training. D. Programmers need to be trained in general networking security

Computer Science & Information Technology

In terms of color theory, what is the definition of true black?

What will be an ideal response?

Computer Science & Information Technology