Which of the following is a remote access attack?

a. Using Linux live CD to bypass the password
b. Using Ophcrack to crack the password
c. Using an SLQ injection
d. Calling tech support

ANS: C

Computer Science & Information Technology

You might also like to view...

Name three of the 2D formats Unity supports.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A method definition that includes a call to itself is said to be recursive. 2. When a recursive call is encountered, computation is temporarily suspended; all of the information needed to continue the computation is saved and the recursive call is evaluated. 3. A base case must include a recursive call. 4. To keep track of recursion most computer systems us a structure called a queue. 5. A stack is a last-in/first-out memory structure.

Computer Science & Information Technology