What's the first method a security tester should attempt to find a password for a computer on the network?
a. Use a scanning tool.
b. Install a sniffer on the network.
c. Ask the user.
d. Install a password-cracking program.
Answer: c. Ask the user.
You might also like to view...
After a finally block has finished executing (and there are no exceptions to be handled), ________.
a. control proceeds to the first statement after the finally block. b. control returns to the throw point. c. the application exits. d. control proceeds to the first statement after the last catch block.
What does encryption guarantee?
What will be an ideal response?
Match the following terms to their meanings:
I. Aggregate functions II. Expression III. Field names IV. String V. Property Sheet A. Series of characters B. Included in square brackets in expressions C. Group and perform calculations on multiple fields D. Begins with an equal sign (=) E. Displays the properties that affect the appearance and behavior of the form
________ is the distance between individual letters
A) Line spacing B) Text direction C) Character spacing D) Tab setting