In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.

Fill in the blank(s) with the appropriate word(s).


Trojan horse

Computer Science & Information Technology

You might also like to view...

The network administrator notices that the hourly plot of a router’s data traffic varies from hour to hour. What does this information tell the network administrator?

a. This is most likely normal operation. b. The network administrator needs to compare this hourly plot with expected hourly plots of the router’s data traffic. c. The network administrator should run diagnostics on the router. d. The router needs to be rebooted.

Computer Science & Information Technology

List three Hyper-V best practices.

What will be an ideal response?

Computer Science & Information Technology

A mail server maintains _______________, separate holding areas for each user's messages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a visual depiction of a population distribution created by the Analysis ToolPak.

A. histogram B. ANOVA C. correlation coefficient D. mu

Computer Science & Information Technology