__________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A) Disruption
B) Replay
C) Service denial
D) Masquerade


B) Replay

Computer Science & Information Technology

You might also like to view...

After a schema is imported into another schema file, any _______ it contains with global scope can be referenced in that file.

A. objects B. variables C. content D. characters

Computer Science & Information Technology

This starts with the top-level domains and then extends to subdomains.

What will be an ideal response?

Computer Science & Information Technology

When using the self-service portal, you should use ___________ to identify the parties with whom you are communicating.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is Ruby annotation?

What will be an ideal response?

Computer Science & Information Technology