Which of the following is a form of an Internet attack?

A. Searching for software design errors

B. Guessing user passwords based on their personal information

C. Breaking the deadman's door to gain entry

D. Planting a trojan horse

Answer Posted / guest

Answer: D

A trojan horse is the only attack among the choices. The
other choices, may be considered risks but are not in
themselves attacks.

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2838


purchase orders issued to vendors have been authorized as per the authorization matrix

1089