Multiple Choice
Methods that hackers use to break into computers are ________.
A) worms
B) probe packets
C) hacks
D) exploits
E) compromises
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q27: Which of the following specifies what should
Q28: Authentication should be _.<br>A)as strong as possible<br>B)appropriate
Q29: Policies are separated by implementation to take
Q31: In identity theft,the attacker steals credit card
Q32: Which of the following is not one
Q33: Trojan horses get onto computers by _.<br>A)viruses<br>B)hackers<br>C)Both
Q34: What are the most dangerous types of
Q35: The general name for malware on a
Q61: Oversight helps ensure that a policy is
Q90: A specific encryption method is called a