An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of error or system response to use to make inferences about the system or environment.
A. active
B. passive
C. dynamic
D. static
Answer: A
You might also like to view...
What is pointer swizzling? Discuss the different approaches to pointer swizzling.
What will be an ideal response?
Useful data is when information is converted into a meaningful format
Indicate whether the statement is true or false
What training should programmers who do custom programming have?
A. Programmers need to be trained in secure programming both in general and for their particular language and application. B. Programmers need to be trained in secure programming for their particular language and application only. C. Programmers don't need any security training. D. Programmers need to be trained in general networking security
In terms of color theory, what is the definition of true black?
What will be an ideal response?