A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?

A. The hacker used a race condition.
B. The hacker used a pass-the-hash attack.
C. The hacker-exploited improper key management.
D. The hacker exploited weak switch configuration


Answer: D. The hacker exploited weak switch configuration

Computer Science & Information Technology

You might also like to view...

The ____ Properties panel provides a convenient way to change all possible options in a style rule without opening the Modify Styles dialog box.

A. Tag B. CSS C. HTML D. JavaScript

Computer Science & Information Technology

Each copy of a workbook to be merged must have a different ____.

A. password B. path C. file name D. number of worksheets

Computer Science & Information Technology

In the figure above, the number  ____ is pointing to the frame rate.

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology

A surge protector cannot protect your equipment from _____.

A. an incompatible power adapter B. a power irregularity C. a power outage D. dust and dirt

Computer Science & Information Technology