Hackers want information about a target person, organization, and _______ to assist in compromising security
a. License plate
b. System
c. Clothing size
d. None of the above
Answer B. Having the system information facilitates the task of a cyberdetective.
Computer Science & Information Technology
You might also like to view...
Which TCP/IP protocol operates on port 80 and displays web pages?
a. FTP b. SMTP c. HTTP d. DNS
Computer Science & Information Technology
When working with your tasks, you can change the ____________________ to see your tasks better.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology