Which of the following is an example of information warfare?

A) Gathering information on an opponent
B) Creating a virus
C) Using a packet sniffer to create a network baseline
D) Using a packet sniffer to check if the encryption is strong enough


A) Gathering information on an opponent

Computer Science & Information Technology

You might also like to view...

The most commonly used number formats are available as buttons in the Data group on the HOME tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

One of the marginal comments states: “The visitor approach allows you to separate how the traversal is done from what is done.” Is this not also true of the iterator approach?

What will be an ideal response?

Computer Science & Information Technology

What is a probing question? What is the purpose of using a probing question in interviews?

What will be an ideal response?

Computer Science & Information Technology

A supervisory control and data acquisition (SCADA) system is a subset of the __________.

A. industrial control system (ICS) B. distributed control system (DCS) C. remote terminal unit (RTU) D. programmable logic controller (PLC)

Computer Science & Information Technology