____ statements can be used iteratively to expand the intruder's view of the database and allow further collection of information.

A. Iterative
B. Conditional
C. Secondary
D. Primary

Answer: B

Computer Science & Information Technology

You might also like to view...

Live or actual field data is NOT recommended for use in the unit testing procedures

Indicate whether the statement is true or false.

Computer Science & Information Technology

Metrics that are useful for profile-based intrusion detection are: counter, gauge, resource utilization, and _________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology