Question: An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as _ _ _ _

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as _______.
waring
trolling
phishing
ransom
2 points
QUESTION 3
The programming language that provides a direct one-to-one correspondence between human-understandable words and machine-understandable numbers is ________ language.
scripting
assembly
visual basic
2 points
QUESTION 4
Which of the following two office suites are most closely related to one another? (Select two.)
LibreOffice + OpenOffice
GNOME Office + Microsoft Office
KOffice + Microsoft Office
Microsoft Office + GNOME Office
2 points
QUESTION 5
True or false: You can modify graphics files from a text-mode login using Linux.
True
False
2 points
QUESTION 6
True or false: All Linux Web browsers are GUI programs.
True
False
2 points
QUESTION 7
Which of the following programming languages is most often implemented as a compiled language?
Python
Bash shell
Perl
C++
PHP
2 points
QUESTION 8
Postfix is a server that implements the SMTP protocol. (Provide the protocols acronym.)
True
False
2 points
QUESTION 9
True or false: xinetd is a super server.
True
False
2 points
QUESTION 10
True or false: KDE is built atop the Qt widget set.
True
False
2 points
QUESTION 11
Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system?
Data transferred to or from a Web site can be intercepted, possibly exposing sensitive data to theft.
The server computer, if compromised, could create a new account on your computer, thus compromising it.
A malicious Web site can steal your local Linux login password and use it to break into your computer.
A virus intended for Windows, when delivered via a Web site to a Linux system, will damage your video card.
2 points
QUESTION 12
A terminal is a GUI program in which text-mode programs (including shells) run.
True
False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!