A technique used to compromise a system is known as a(n) __________.
A. threat
B. attackĀ
C. exploit
D. vulnerability
Answer: C
You might also like to view...
802.11 wireless networks exist as ____ on nearly all large networks.
A. subnets B. tunnels C. ports D. rings
To create a crosstab query using fields from more than one table, the user must create a select query with the fields from both tables and then use the query as the data source for the crosstab query
Indicate whether the statement is true or false
Typing a new list after starting the mail merge process is one method for getting the variable information that will be inserted into a main document
Indicate whether the statement is true or false
Which of the followingObjectconstructor methods defines or modifies the property,prop, for the object,obj; wheredescriptordescribes the property.
A. obj.defineProperty(object, prop,descriptor) B. prop.defineProperty(object,descriptor)) C. Object.defineProperty(obj, prop,descriptor) D. Object.descriptor(obj, property)