Question 1 point
__________ is the exploitation of an organization’s telephone, dial, and private branch exchange
(PBX) system to infiltrate the internal network in order to abuse computing resources.
War driving
Line dialing
PBX driving
War dialing
View Feedback
Question 2 point
__________ cryptography is the most common method on the Internet for authenticating a
message sender or encrypting a message.
Symmetric
Hash-based
Private-key
Public-key
View Feedback
Question 3 point
__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD.
Gnoppix
GeeXboX
Morphix
Damn Small Linux