Capturing packets is also referred to as ____.

A. packet stiffing
B. packet sniffing
C. packet hiding
D. packet blocking

Answer: B

Computer Science & Information Technology

You might also like to view...

Discuss the justifications used by terrorists to maximize ideological appeal

What will be an ideal response?

Computer Science & Information Technology

Risk _________ is the application of security mechanisms to reduce the risks to an organization's data and information systems.

A. management B. control C. identification D. security

Computer Science & Information Technology