Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?

A. egress filtering
B. session hijacking
C. data authentication
D. network sniffing


Answer: B

Computer Science & Information Technology

You might also like to view...

___________________ operators are used to join two or more Boolean expressions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the difference between the iterators defined here.

vector vec; //put 10 values into vec const vector::iterator p = vec.begin(); vector::const_iterator q = vec.begin();

Computer Science & Information Technology

If a variable is said to have block scope then that variable:

a) can be accessed by all methods b) can be accessed only by certain methods c) can be accessed only by the method in which it was defined d) None of the above

Computer Science & Information Technology

Use Figure 6.10 to trace the path of the packets that are sent as a result of the ping command (e.g., ARP Request and Reply, ICMP Echo Request and Reply). Justify your answer with the saved data from Step 10.

What will be an ideal response?

Computer Science & Information Technology