Which of the following is the first step in any computer attack?
a. Performing a DoS attack
b. Actively collecting information about the system
c. Passive collection of information about the system
d. Port scanning
ANS: C
Computer Science & Information Technology
You might also like to view...
What is the output of the following code fragment if x is 15?
if(x < 20) if(x <10) cout << "less than 10 "; else cout << "large\n"; a. less than 10 b. nothing c. large d. no output, syntax error
Computer Science & Information Technology
The contains operation, used to determine if a particular element is in a list, relies on the find support method to locate the element. The find method, in turn relies on which method being implemented in order to work?
What will be an ideal response?
Computer Science & Information Technology