Match the hacking terminology with its meaning
1. Wetware a. a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmer is fired and not available to suppress action
2. Time bomb b. a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
3. Bit bucket c. an individual hired by a company to test its security systems by attempting to violate them
4. Brute force d. the final destination of discarded, lost, or destroyed data
5. Sneaker e. a term used to refer to humans operating computers (as opposed to hardware and software)
Answer: 1. e
2. a
3. d
4. b
5. c
You might also like to view...
Which of the following is a best practice when setting up a client to use the LDAPS protocol with a server?
A. The client should follow LDAP referrals to other secure servers on the network B. The client should trust the CA that signed the server's certificate C. The client should present a self-signed certificate to the server D. The client should have access to port 389 on the server
First normal form refers to ____.
A. redundant data in an original table that is extracted, placed in a new table, and related to the first table B. derived fields that are removed C. a 2-dimensional table with rows and columns D. calculated fields that are removed