The attacker can use sniffing software to capture data and intercept passwords

Indicate whether the statement is true or false.


ANS: True

Computer Science & Information Technology

You might also like to view...

Which predefined server-level role allows a user to create or alter any database?

A. security admin B. dbcreator C. database auditor D. sysroot

Computer Science & Information Technology

A ____ is a collection of Web pages that are linked logically, and located together on a hosting computer.

a. site map b. Web site c. Web gallery d. Web portfolio

Computer Science & Information Technology

An organization that utilizes single sign-on has a primary domain and three secondary domains. Which of the following statements will be true of this scenario? (Choose two.)

A. The secondary domains need to trust the primary domain to protect the authentication credentials used to verify the end user identity to the secondary domains for authorized use. B. The primary domain needs to trust the secondary domains to protect the authentication credentials used to verify the end user identity to the primary domain for authorized use. C. The secondary domains will assert the identity and authentication credentials to the primary domain on behalf of the user. D. The primary domain will assert the identity and authentication credentials to the secondary domains on behalf of the user.

Computer Science & Information Technology

_____ can be used to keep track of the pages you view at a site, the merchandise you select, and other profile information.

A. Temporary files B. Session IDs C. Cookies D. Cache

Computer Science & Information Technology