Which of the following would most likely be used by a hacker to intercept and read online communications?
A) back-translation
B) encryption
C) a sniffer
D) authentication
E) a firewall
C
You might also like to view...
A(n) ________ describes which assessment method(s) will be used to evaluate each of the important characteristics for the job.
A) job analysis B) job description C) assessment plan D) person specification
Which of the following statements characterizes a firm that operates within a "high-networked" structure?
A) It uses outside organizations for only a limited number of minor value chain activities. B) It has little contact with firms to which work has been outsourced. C) It owns and executes most of its primary and support value chain activities. D) It has more value chain activities networked to external organizations than it owns and executes internally.