Which attack type typically involves the monitoring of data flow between systems without modifying the data?
A. Close-in
B. Passive
C. Insider
D. Distribution
Answer: B. Passive
You might also like to view...
With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.
Fill in the blank(s) with the appropriate word(s).
Consider optimistic concurrency control as applied to the transactions T and U. Suppose that transactions T and U are active at the same time as one another. Describe the outcome in each of the following cases:
i) T's request to commit comes first and backward validation is used; ii) U's request to commit comes first and backward validation is used; iii) T's request to commit comes first and forward validation is used; iv) U's request to commit comes first and forward validation is used. In each case describe the sequence in which the operations of T and U are performed, remembering that writes are not carried out until after validation