An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of error or system response to use to make inferences about the system or environment.
A. active
B. passive
C. dynamic
D. static
Answer: A
You might also like to view...
To increase or decrease the font size by small amounts, click the ____ Font or Shrink Font buttons in the Font group on the Home tab or on the Mini toolbar.
A. Grow B. Enlarge C. Maximize D. Zoom
Case Based Critical ThinkingCase 1Rae is building a website for the local chamber of commerce. This week, Rae is designing and completing a page that contains a list, headings, body text, images, and a background. During this process, Rae develops a style sheet for the project. Rae believes that joining the Chamber of Commerce probably seems complicated to some of the smaller businesses in town, and she has decided to include a step-by-step tutorial on joining. Since the tasks in her tutorial should be completed in sequence, which of the following formats should she use?
A. Bulleted list B. Ordered list C. Unordered list D. Special list