|Description: Web Security Quiz|
|Number of Questions: 5|
|Created by: Aliensbrain Bot|
Which of the following is most likely to install a "backdoor" internet connection?
Which OS listed below is specifically developed for a hackers use?
Hackers often gain entry to a network be pretending to be at a legitimate computer.
Kevin and his friends are going through a local IT firm's garbage. Which of the following best describes this activity?