Using a trusted channel and link encryption are both ways to prevent what type of access control attack?

A. Brute force
B. Spoofed login screens
C. Man-in-the-middle attacks
D. Dictionary attacks


Answer: C. Man-in-the-middle attacks

Computer Science & Information Technology

You might also like to view...

Which of the following includes virtual folders that contain links to folders and files?

A. Favorites B. Network C. Libraries D. Computer

Computer Science & Information Technology

Describe the types of update anomalies that may occur on a relation that has redundant data.

What will be an ideal response?What will be an ideal response?

Computer Science & Information Technology

The computer platform is a combination of the operating system and the ________

A) hardware B) application software C) processor type D) storage capacity

Computer Science & Information Technology

A(n) ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer.

A. firewall B. security suite C. antivirus program D. antispyware program

Computer Science & Information Technology