______________ is surreptitiously obtaining data from an unknowing end user who is performing a legitimate function.

A. skimming
B. attempt
C. eavesdropping
D. sniffing
E. copying


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following PHP expressions can get the domain name from a customer's email address?

a. $email_array = explode('@', $email); b. $email_array = join('@', $email); c. $email_array = implode('@', $email); d. $email_array = strtoupper('@', $email);

Computer Science & Information Technology

____ view shows the contacts as cards but much smaller than Business Card view.

A. Mini-Business B. Card C. Phone D. List

Computer Science & Information Technology

The __________ step in the intranet vulnerability assessment is identical to the one followed in Internet vulnerability analysis.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

After the app is terminated, what happens to the data stored within the SQLite database?

A. It erases. B. It pauses. C. It is transferred to another location. D. It persists.

Computer Science & Information Technology