ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 350 - 312-38 discussion

Report
Export

Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?

A.
Buffer overflow
Answers
A.
Buffer overflow
B.
Zero-day attack
Answers
B.
Zero-day attack
C.
Smurf attack
Answers
C.
Smurf attack
D.
None
Answers
D.
None
E.
Shock brutal force
Answers
E.
Shock brutal force
Suggested answer: E
asked 18/09/2024
Zaneta Zagajewska
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first