Which of the following is an example of a physical access attack?
a. Using Linux live CD to bypass the password
b. Using cross-side scripting
c. Using an SLQ injection
d. Using NSAudit
ANS: A
Computer Science & Information Technology
You might also like to view...
The command [Alt-l] converts the word following the cursor to:
a: upper case b: lower case c: capitalized d: bold e: none of the above
Computer Science & Information Technology
A network analyst received a number of reports that impersonation was taking place on the network. Session tokens were deployed to mitigate this issue and defend against which of the following attacks?
A. Replay B. DDoS C. Smurf D. Ping of Death
Computer Science & Information Technology