Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO's office with various connected cables from the office. Which of the following describes the type of attack that was occurring?
A. Spear phishing
B. Packet sniffing
C. Impersonation
D. MAC flooding
Answer: B. Packet sniffing
Computer Science & Information Technology
You might also like to view...
Distinguish among hardware, software and firmware.
What will be an ideal response?
Computer Science & Information Technology
Write a program that creates a linked list object of 10 characters and creates a second list object containing a copy of the first list, but in reverse order.
What will be an ideal response?
Computer Science & Information Technology
While attempting to identify the problem, you should _______________ the user and identify user changes to the computer.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which CSS3 media type is intended for Braille tactile feedback devices?
A. embossed B. tty C. braille D. speech
Computer Science & Information Technology