Which of the following would an attacker use to penetrate and capture additional traffic prior to performing an IV attack?
A. DNS poisoning
B. DDoS
C. Replay attack
D. Dictionary attacks
Ans: D. Dictionary attacks
Computer Science & Information Technology
You might also like to view...
Which of the following is true when you select a virtual machine in the Virtual Machines view in administrator console?
A. you can work with snapshots by clicking Manage checkpoints B. CPU usage for that VM is shown as a numeric percentage C. you need to switch to the Hosts view before connecting to the VM D. double-clicking the thumbnail of the VM displays its current status
Computer Science & Information Technology
A(n) _____ data type is a collection of data types that the XML Schema developers created based on the base types.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology