In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.
Fill in the blank(s) with the appropriate word(s).
Trojan horse
You might also like to view...
The network administrator notices that the hourly plot of a router’s data traffic varies from hour to hour. What does this information tell the network administrator?
a. This is most likely normal operation. b. The network administrator needs to compare this hourly plot with expected hourly plots of the router’s data traffic. c. The network administrator should run diagnostics on the router. d. The router needs to be rebooted.
List three Hyper-V best practices.
What will be an ideal response?
A mail server maintains _______________, separate holding areas for each user's messages.
Fill in the blank(s) with the appropriate word(s).
A(n) ________ is a visual depiction of a population distribution created by the Analysis ToolPak.
A. histogram B. ANOVA C. correlation coefficient D. mu