Multiple Choice
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?
A) exploit
B) attack vector
C) carding
D) wardriver
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: According to the reports in Ponemon's 2014
Q7: Organizations can implement countermeasures that make data
Q8: Explain how data breach occurs with an
Q9: The _ is a regulatory law that
Q10: Talgedco Inc., a software company, has taken
Q12: The _ is a regulatory law that
Q13: The Gramm-Leach-Bliley Act (GLBA) is a universal
Q14: Jobs Dot Com, an online recruitment site,
Q15: Personally identifiable information includes a person's bank
Q16: Explain the basic countermeasures to be taken