Which of the following would an attacker use to penetrate and capture additional traffic prior to performing an IV attack?

A. DNS poisoning
B. DDoS
C. Replay attack
D. Dictionary attacks


Ans: D. Dictionary attacks

Computer Science & Information Technology

You might also like to view...

The current method executing is always the method whose activation record is ________.

a. at the bottom of the stack. b. at the top of the stack. c. never placed on the stack. d. second from the top of the stack, just below the previous method call.

Computer Science & Information Technology

Let V(G) denote the set of vertices, and E(G) denote the set of edges of a graph G, then if the elements of E are ordered pairs, G is called a directed graph or ____.

A. bigraph B. d-graph C. dir-graph D. digraph

Computer Science & Information Technology

Many batteries on computers and mobile devices can be charged only a certain number of times before they fail completely.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following interprets and carries out the basic instructions that operate a computer?

A. control unit B. binary device C. CPU D. compressor

Computer Science & Information Technology