A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician
The type of security threat that uses computers or other networks to accept and pass on viruses is called:
B. botnets.
D. man-in-the-middle.
Section: Security
Explanation
Explanation/Reference:
QUESTION 18
Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new
content. Joe is the victim of which of the following?
A. Trojan horse
B. Spyware
C. Social engineering
D. Worms
Dostları ilə paylaş: