Which attack type typically involves the monitoring of data flow between systems without modifying the data?

A. Close-in
B. Passive
C. Insider
D. Distribution

Answer: B. Passive

Computer Science & Information Technology

You might also like to view...

With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Consider optimistic concurrency control as applied to the transactions T and U. Suppose that transactions T and U are active at the same time as one another. Describe the outcome in each of the following cases:

i) T's request to commit comes first and backward validation is used; ii) U's request to commit comes first and backward validation is used; iii) T's request to commit comes first and forward validation is used; iv) U's request to commit comes first and forward validation is used. In each case describe the sequence in which the operations of T and U are performed, remembering that writes are not carried out until after validation

Computer Science & Information Technology