Which of the following is an example of a remote access attack?
A) Using a Linux live CD to bypass the password
B) Using OphCrack to crack the password
C) Using an SQL injection
D) Using OphCrack
C) Using an SQL injection
Computer Science & Information Technology
You might also like to view...
If a cell is activated and then the bold button on the formatting toolbar is pressed, which of the following results will happen?
A) Only the data in the column will be bolded. B) All data in the table will be bolded. C) Only the data in the cell will be bolded. D) Only the data in the row will be bolded.
Computer Science & Information Technology
Which of the following is a font effect?
A) Contrast B) Small caps C) Brightness D) Scale
Computer Science & Information Technology