Question: An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as _ _ _ _
An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as
waring
trolling
phishing
ransom
points
QUESTION
The programming language that provides a direct onetoone correspondence between humanunderstandable words and machineunderstandable numbers is language.
scripting
assembly
visual basic
points
QUESTION
Which of the following two office suites are most closely related to one another? Select two.
LibreOffice OpenOffice
GNOME Office Microsoft Office
KOffice Microsoft Office
Microsoft Office GNOME Office
points
QUESTION
True or false: You can modify graphics files from a textmode login using Linux.
True
False
points
QUESTION
True or false: All Linux Web browsers are GUI programs.
True
False
points
QUESTION
Which of the following programming languages is most often implemented as a compiled language?
Python
Bash shell
Perl
C
PHP
points
QUESTION
Postfix is a server that implements the SMTP protocol. Provide the protocols acronym.
True
False
points
QUESTION
True or false: xinetd is a super server.
True
False
points
QUESTION
True or false: KDE is built atop the Qt widget set.
True
False
points
QUESTION
Which of the following are risks you take when you browse the Web as an ordinary user on a properlyconfigured Linux system?
Data transferred to or from a Web site can be intercepted, possibly exposing sensitive data to theft.
The server computer, if compromised, could create a new account on your computer, thus compromising it
A malicious Web site can steal your local Linux login password and use it to break into your computer.
A virus intended for Windows, when delivered via a Web site to a Linux system, will damage your video card.
points
QUESTION
A terminal is a GUI program in which textmode programs including shells run.
True
False
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
