Capturing packets is also referred to as ____.
A. packet stiffing
B. packet sniffing
C. packet hiding
D. packet blocking
Answer: B
Computer Science & Information Technology
You might also like to view...
Discuss the justifications used by terrorists to maximize ideological appeal
What will be an ideal response?
Computer Science & Information Technology
Risk _________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.
A. management B. control C. identification D. security
Computer Science & Information Technology