Which of the following is an example of a physical access attack?

a. Using Linux live CD to bypass the password
b. Using cross-side scripting
c. Using an SLQ injection
d. Using NSAudit

ANS: A

Computer Science & Information Technology

You might also like to view...

The command [Alt-l] converts the word following the cursor to:

a: upper case b: lower case c: capitalized d: bold e: none of the above

Computer Science & Information Technology

A network analyst received a number of reports that impersonation was taking place on the network. Session tokens were deployed to mitigate this issue and defend against which of the following attacks?

A. Replay B. DDoS C. Smurf D. Ping of Death

Computer Science & Information Technology