Which of the following can best be described as the exploitation of a computer session in an attempt to gain unauthorized access to data?

A. DoS
B. Session hijacking
C. Null session
D. Domain name kiting


B. Session hijacking is the exploitation of a computer session in an attempt to gain unauthorized access to data or other resources on a computer. DoS (denial-of-service) is any attack that attempts to make computer resources unavailable. A null session is a type of exploit that makes unauthenticated NetBIOS connections to a target computer. Domain name kiting is the process of deleting a domain name during a 5-day grace period.

Computer Science & Information Technology

You might also like to view...

Given that k is an integer array starting at location 2000, kPtr is a pointer to k and each integer is stored in 4 bytes of memory, what location does kPtr + 3 point to?

a. 2003 b. 2006 c. 2012 d. 2024

Computer Science & Information Technology

Traditional two-dimensional arrays, where each row has the same number of columns, are sometime referred to as ____________.

a. square arrays b. rectangular arrays c. box arrays d. 2D arrays

Computer Science & Information Technology

Match the portions of the following functions to their descriptions:

I. first argument of an IF function II. display of a function's arguments III. requires just one argument IV. has three arguments V. requires no arguments A. the TODAY function B. the logical test C. ScreenTip D. the SUM function E. the IF function

Computer Science & Information Technology

If a Sub procedure has more than one argument, the variables are passed in the same order in which they appear in the procedure call statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology