Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO's office with various connected cables from the office. Which of the following describes the type of attack that was occurring?

A. Spear phishing
B. Packet sniffing
C. Impersonation
D. MAC flooding


Answer: B. Packet sniffing

Computer Science & Information Technology

You might also like to view...

Distinguish among hardware, software and firmware.

What will be an ideal response?

Computer Science & Information Technology

Write a program that creates a linked list object of 10 characters and creates a second list object containing a copy of the first list, but in reverse order.

What will be an ideal response?

Computer Science & Information Technology

While attempting to identify the problem, you should _______________ the user and identify user changes to the computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which CSS3 media type is intended for Braille tactile feedback devices?

A. embossed B. tty C. braille D. speech

Computer Science & Information Technology