A computer is the __________ of an attack when it is used to conduct an attack against another computer.

A. subject
B. object
C. target
D. facilitator

Answer: A

Computer Science & Information Technology

You might also like to view...

Which two High Availability (HA) Cluster admission control policies can help avoid resource fragmentation? (Choose two.)

A. Define failover capacity by static number of hosts B. Define failover capacity by reserving a percentage of the cluster resources C. Use dedicated failover hosts D. Use Virtual Machine Monitoring

Computer Science & Information Technology

?A transition must start immediately after an event that triggers it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology