Scanning bulletin boards, making phony phone calls, and visiting websites by a hacker are examples of _________
a. Active scanning
b. Passive scanning
c. Phreaking
d. Scouring
Answer B.
Computer Science & Information Technology
You might also like to view...
Match the SQL keywords at the top with what would follow those words from the list at the bottom to accomplish the following: display three fields (Field1, Field2, Field3 ) from the Sample table, sorted by Field1 in ascending order, and with only those records where Field2 equals "FrogLegs" and put all those in a new table called "Delicacies"
I. SELECT II. WHERE III. ORDER BY IV. FROM V. INTO A. Sample B. Field2="FrogLegs" C. Field2 DESC D. Field1, Field2, Field3 E. Delicacies
Computer Science & Information Technology
When a line of text contains revisions, the left margin displays a:
a. vertical change bar b. horizontal change bar c. balloon
Computer Science & Information Technology