A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

A. eavesdropping attack B. denial-of-service attack

C. client attack D. host attack

D. host attack

Computer Science & Information Technology

You might also like to view...

Which type of positioning will keep an element in view, no matter how far down you scroll the page?

a. static positioning b. absolute positioning c. fixed positioning d. relative positioning

Computer Science & Information Technology

In which scenario would a rootkit be used?

A) To gain administrator access to a Windows 7 computer B) To remotely wipe a smartphone C) To detect wireless networks in the area D) To gain unauthorized access to a wireless network or access point

Computer Science & Information Technology