A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) ransomware.
E) injection attack.
Question 2
All of the following are tools or technologies for extracting information from unstructured data sets except:
A) sentiment analysis software.
B) SQL queries.
C) Hadoop.
D) a non-relational DBMS.
E) text mining.