A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.
A. eavesdropping attack B. denial-of-service attack
C. client attack D. host attack
D. host attack
Computer Science & Information Technology
You might also like to view...
Which type of positioning will keep an element in view, no matter how far down you scroll the page?
a. static positioning b. absolute positioning c. fixed positioning d. relative positioning
Computer Science & Information Technology
In which scenario would a rootkit be used?
A) To gain administrator access to a Windows 7 computer B) To remotely wipe a smartphone C) To detect wireless networks in the area D) To gain unauthorized access to a wireless network or access point
Computer Science & Information Technology