____ statements can be used iteratively to expand the intruder's view of the database and allow further collection of information.
A. Iterative
B. Conditional
C. Secondary
D. Primary
Answer: B
Computer Science & Information Technology
You might also like to view...
Live or actual field data is NOT recommended for use in the unit testing procedures
Indicate whether the statement is true or false.
Computer Science & Information Technology
Metrics that are useful for profile-based intrusion detection are: counter, gauge, resource utilization, and _________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology