Which of the following can an attacker use to gather information on a system without having a user ID or password?
Which of the following threats is the MOST difficult to detect and hides itself from the operating system?
Which of the following type of strategies can be applied to allow a user to enter their username and password once in order to authenticate to multiple systems and applications?
Taking into account personal safety, which of the following types of fire suppression substances would BEST prevent damage to electronic equipment?