Which of the following is the first step in any computer attack?
A) Performing a DoS attack
B) Actively collecting information about the system
C) Passive collection of information about the system
D) Port scanning
C) Passive collection of information about the system
Computer Science & Information Technology
You might also like to view...
The active cell is the cell in which the user is currently adding data
Indicate whether the statement is true or false
Computer Science & Information Technology
How can an organization document a project's lifecycle process to ensure that a project follows best practices?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology