CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 31
•
29
The instructions contained with an object are
known as its:
•
30
Rootkits can be difficult to detect because:
•
31
A user, Bill, has posted a link on a web site that
causes unsuspecting users to transfer money to Bill if they click
the link. The link will only work for users who happen to be
authenticated to the bank that is the target of the link. This is
known as:
•
32
An attack on a DNS server to implant forged “A”
records is characteristic of a:
•
33
“Safe languages” and “safe libraries” are socalled because: