Which of the following is not a type of cyber-attack?

(a) Kerberos.
(b) A trojan horse.
(c) A virus.
(d) Denial of service.

(a) Kerberos.

Computer Science & Information Technology

You might also like to view...

Visual C# apps can have multiple threads of execution, where each thread has its own ________ stack, allowing it to execute concurrently with other threads while sharing with them application-wide resources such as memory and processors. This capability is called multithreading.

a) method-call b) attribute c) memory d) application

Computer Science & Information Technology

Which of the following is the escape sequence that represents the newline character?

A. '\endl' B. '/t' C. '\n' D. '\t'

Computer Science & Information Technology