Which of the following is the first step in any computer attack?

a. Performing a DoS attack
b. Actively collecting information about the system
c. Passive collection of information about the system
d. Port scanning

ANS: C

Computer Science & Information Technology

You might also like to view...

What is the output of the following code fragment if x is 15?

if(x < 20) if(x <10) cout << "less than 10 "; else cout << "large\n"; a. less than 10 b. nothing c. large d. no output, syntax error

Computer Science & Information Technology

The contains operation, used to determine if a particular element is in a list, relies on the find support method to locate the element. The find method, in turn relies on which method being implemented in order to work?

What will be an ideal response?

Computer Science & Information Technology