How can an attacker use Wireshark to compromise your network security?
What will be an ideal response?
An attacker on the LAN can use Wireshark to observe the network traffic and can get sensitive
information in the packet details if the traffic is not encrypted.
You might also like to view...
____________ are networks of zombie computers that magnify the scope and intensity of an attack.
Fill in the blank(s) with the appropriate word(s).
SQL Server data is stored, retrieved, and manipulated within a ____ architecture.
A. triangular B. flat C. node-outposts D. client-server
Case WD 6-1Hilary has been assigned to put together a financial report that will be presented at the next sales meeting. Hilary wants to change the footnotes from numbers to symbols. What should she do?
A. Delete the footnote and start over. B. Delete the footnote number and type a symbol. C. Click the References tab, then click the dialog box launcher to open the Footnote and Endnote dialog box. D. Double-click a footnote to open the Footnote and Endnote dialog box.
____ encoding is very useful when binary data needs to transfer correctly among platforms with different code pages over the Internet.
A. Base64 B. SHA1 C. MD5 D. RC4