Which of the following would an attacker use to penetrate and capture additional traffic prior to performing an IV attack?
A. DNS poisoning
B. DDoS
C. Replay attack
D. Dictionary attacks
Ans: D. Dictionary attacks
You might also like to view...
The current method executing is always the method whose activation record is ________.
a. at the bottom of the stack. b. at the top of the stack. c. never placed on the stack. d. second from the top of the stack, just below the previous method call.
Let V(G) denote the set of vertices, and E(G) denote the set of edges of a graph G, then if the elements of E are ordered pairs, G is called a directed graph or ____.
A. bigraph B. d-graph C. dir-graph D. digraph
Many batteries on computers and mobile devices can be charged only a certain number of times before they fail completely.
Answer the following statement true (T) or false (F)
Which of the following interprets and carries out the basic instructions that operate a computer?
A. control unit B. binary device C. CPU D. compressor