What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A. eavesdropping
B. overflowing
C. injecting
D. capturing


Answer: A

Computer Science & Information Technology

You might also like to view...

For different users to share a vocabulary effectively, _____ must be developed that specifically control what code and content a document from that vocabulary might contain.

A. guidelines B. rules C. goals D. objectives

Computer Science & Information Technology

When you are having difficulty conveying an idea in words, which of the five Cs would apply when creating a visual?

A. Compelling B. Clear C. Concise D. Connected E. Complete

Computer Science & Information Technology

A good practice is to limit filenames to ____ characters.

A. four B. eight C. nine D. none of the above

Computer Science & Information Technology

SSL supports firewall-based ____.

A. IP forwarding B. encryption C. VPN D. application proxy

Computer Science & Information Technology