Which of the following is an example of information warfare?
a. Gathering information on an opponent
b. Creating a virus
c. Using a packet sniffer to create a network baseline
d. Using a packet sniffer to check if the encryption is strong enough
ANS: A
You might also like to view...
Using public set methods helps provide data integrity if:
a. The instance variables are public. b. The instance variables are private. c. The methods perform validity checking. d. Both b and c.
A software program that interprets and displays documents formatted in the hypertext markup language, HTML, is known as:
A) a web browser. B) a blog. C) an email. D) a webpage.
Use _________ for punctuating the United States national anthem, the Star Spangled Banner.?
A. ?italics B. ?quotation marks
If a particular 2-3 tree does NOT contain 3-nodes, it is like a ______.
a) general tree b) binary search tree c) full binary tree d) complete binary tree