Which of the following is an example of a remote access attack?

A) Using a Linux live CD to bypass the password
B) Using OphCrack to crack the password
C) Using an SQL injection
D) Using OphCrack

C) Using an SQL injection

Computer Science & Information Technology

You might also like to view...

If a cell is activated and then the bold button on the formatting toolbar is pressed, which of the following results will happen?

A) Only the data in the column will be bolded. B) All data in the table will be bolded. C) Only the data in the cell will be bolded. D) Only the data in the row will be bolded.

Computer Science & Information Technology

Which of the following is a font effect?

A) Contrast B) Small caps C) Brightness D) Scale

Computer Science & Information Technology