What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?
A. eavesdropping
B. overflowing
C. injecting
D. capturing
Answer: A
Computer Science & Information Technology
You might also like to view...
For different users to share a vocabulary effectively, _____ must be developed that specifically control what code and content a document from that vocabulary might contain.
A. guidelines B. rules C. goals D. objectives
Computer Science & Information Technology
When you are having difficulty conveying an idea in words, which of the five Cs would apply when creating a visual?
A. Compelling B. Clear C. Concise D. Connected E. Complete
Computer Science & Information Technology
A good practice is to limit filenames to ____ characters.
A. four B. eight C. nine D. none of the above
Computer Science & Information Technology
SSL supports firewall-based ____.
A. IP forwarding B. encryption C. VPN D. application proxy
Computer Science & Information Technology