Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing
Answer: D. Packet sniffing
Computer Science & Information Technology
You might also like to view...
What is one of the most popular methods of ensuring the integrity of traffic?
A) Encryption B) Hashing C) Tunneling D) Factoring
Computer Science & Information Technology
Match the memory term with the description. Dual-channel _______ Double-sided _______ Registered _______ Unbuffered _______ ECC _______ A. Two modules in one package B. Delay transfer for accuracy C. Special error checking D. Two memory paths E. Most common
Fill in the blank(s) with correct word
Computer Science & Information Technology