____ traverse the network searching for packets of data from which information can be extracted.

A. Network sniffers
B. Data scanners
C. Data diggers
D. Port loggers


Answer: A

Computer Science & Information Technology

You might also like to view...

The master session key is also known as the __________ key.

A. AAA B. GTK C. MIC D. STA

Computer Science & Information Technology

A(n) ____________________ is a number based on base-16 mathematics rather than the base-10 form that we use every day.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a whistleblower? List and describe five suggestions for reducing the risk of career repercussions experienced by whistleblowers.

What will be an ideal response?

Computer Science & Information Technology

What are switching costs in e-commerce?

(a) They are the costs associated with setting up an Intranet. (b) They are the costs associated with starting an e-business. (c) They are the costs associated with switching associations between e-businesses. (d) They are the costs associated with switching Internet Service Providers.

Computer Science & Information Technology