Which of the following is not a type of cyber-attack?

(a) Kerberos.
(b) A trojan horse.
(c) A virus.
(d) Denial of service.


(a) Kerberos.

Computer Science & Information Technology

You might also like to view...

Java limits the number of dimensions an array can have to four.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Once a GameObject has been created, you can attach behaviors to it. What is the Unity term for these?

What will be an ideal response?

Computer Science & Information Technology

A ________ is a pointing device that works like an upside-down mouse, with users moving the pointer around the screen by rolling a ball with their finger.

A. trackball B. stylus C. scanner D. touchpad

Computer Science & Information Technology

Why is it significant that the IEEE 802.3 committee decided to make no changes to the actual Ethernet frames when developing faster cabling standards?

What will be an ideal response?

Computer Science & Information Technology