Scanning bulletin boards, making phony phone calls, and visiting websites by a hacker are examples of _________

a. Active scanning
b. Passive scanning
c. Phreaking
d. Scouring

Answer B.

Computer Science & Information Technology

You might also like to view...

Match the SQL keywords at the top with what would follow those words from the list at the bottom to accomplish the following: display three fields (Field1, Field2, Field3 ) from the Sample table, sorted by Field1 in ascending order, and with only those records where Field2 equals "FrogLegs" and put all those in a new table called "Delicacies"

I. SELECT II. WHERE III. ORDER BY IV. FROM V. INTO A. Sample B. Field2="FrogLegs" C. Field2 DESC D. Field1, Field2, Field3 E. Delicacies

Computer Science & Information Technology

When a line of text contains revisions, the left margin displays a:

a. vertical change bar b. horizontal change bar c. balloon

Computer Science & Information Technology