Multiple Choice
Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?
A) back door
B) hole
C) discovery
D) hash
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: Which of the following reveals a system
Q10: Strictly speaking, VPNs use tunneling protocols; therefore,
Q11: Which of the following is an area
Q12: Which of the following is unsolicited and
Q13: Which type of attacks are designed to
Q15: Briefly describe IP service implementation vulnerabilities, and
Q16: A(n) _ model excludes users from access
Q17: Briefly describe the following types of attacks:
Q18: What is meant by the term buffer
Q19: _ attacks are DoS attacks that are