Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?

A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing


Answer: D. Packet sniffing

Computer Science & Information Technology

You might also like to view...

Give an example of a schedule produced by a recoverable but nonstrict concurrency control involving three transactions in which a deadlock occurs, causing a cascaded abort of all three.

What will be an ideal response?

Computer Science & Information Technology

Case-based Critical Thinking QuestionsCase 12-2Rosalind wants to add attribute declarations to her DTD, and she turns to you for information about the possible attribute types. You tell Rosalind about the CDATA attribute type. Which of the following attribute values would NOT be allowed for an attribute of this type?

A. 25.99 B. New York, NY C. Bob & Jenny D. yellow

Computer Science & Information Technology

A box in the upper left corner of the worksheet grid that selects all the cells in a worksheet is the:

a. name box b. select all box c. split box

Computer Science & Information Technology

A message that displays when the user enters invalid data in a cell containing a validation rule.

What will be an ideal response?

Computer Science & Information Technology