Which of the following is described as the viewing of information that passes along a network line?

a. Sniffing
b. Spoofing
c. Hijacking
d. Impersonation


a
FEEDBACK: a. Correct.
b. Incorrect. Spoofing involves altering e-mail headers or IP addresses, an act that has little productive use.
c. Incorrect. Hijacking involves mimicking names of popular Internet host names. Programmers sometimes use this during development, but another answer is much more popular.
d. Incorrect. Customer impersonation occurs when customers falsify their identities and make fraudulent purchase requests, an act that has little productive use.

Business

You might also like to view...

Shrinking the amount of product instead of raising the price is a good way to counteract consumer

resistances to price increases. Indicate whether the statement is true or false

Business

Discuss four general strategies that managers can use to streamline meetings.

What will be an ideal response?

Business

Which of the following is true of gimmicks?

a. They can be a fun way to liven up a speech. b. They can help convince the audience. c. They should be used in moderation. d. They do not treat the audience fairly.

Business

Which of the following is an example of a survey question that allows for a direct rating?

A) On a scale of 1-10 how satisfied were you with your last experience with our product? B) Which of the following best reflects the way you feel about our product in comparison to competitors' products? C) What is the top level of education that you completed? D) How likely would you be to recommend our product to a friend? E) How likely would you be to buy our product again?

Business