Which of the following is the first step in any computer attack?

A) Performing a DoS attack
B) Actively collecting information about the system
C) Passive collection of information about the system
D) Port scanning


C) Passive collection of information about the system

Computer Science & Information Technology

You might also like to view...

Which part of the NIST Cybersecurity Framework is designed to help organizations view and understand the characteristics of their approach to managing cybersecurity risk?

A) The Framework Tiers B) The Framework Core C) The Framework Outcomes D) The Framework Profiles

Computer Science & Information Technology

Codec is short for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Information produces data for the purposes of decision making

Indicate whether the statement is true or false

Computer Science & Information Technology

A Case structure is used most often when conditions are treated separately.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology