Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?

A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing

Answer: D. Packet sniffing

Computer Science & Information Technology

You might also like to view...

What is one of the most popular methods of ensuring the integrity of traffic?

A) Encryption B) Hashing C) Tunneling D) Factoring

Computer Science & Information Technology

Match the memory term with the description. Dual-channel _______ Double-sided _______ Registered _______ Unbuffered _______ ECC _______ A. Two modules in one package B. Delay transfer for accuracy C. Special error checking D. Two memory paths E. Most common

Fill in the blank(s) with correct word

Computer Science & Information Technology