Hackers want information about a target person, organization, and _______ to assist in compromising security

a. License plate
b. System
c. Clothing size
d. None of the above

Answer B. Having the system information facilitates the task of a cyberdetective.

Computer Science & Information Technology

You might also like to view...

Which TCP/IP protocol operates on port 80 and displays web pages?

a. FTP b. SMTP c. HTTP d. DNS

Computer Science & Information Technology

When working with your tasks, you can change the ____________________ to see your tasks better.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology