Multiple Choice
The process of capturing and recording network traffic is referred to as _____.
A) sniffing
B) phishing
C) bombing
D) pharming
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q79: Explain how proximity-release door openers are used
Q80: Level 1 security protects back-end systems to
Q81: _ are an inexpensive way to secure
Q82: In the context of security, _ is
Q83: Which statement is true of asymmetric encryption?<br>A)It
Q85: _, a more recent cryptographic protocol, ensures
Q86: _ outlines procedures for keeping an organization
Q87: Spoofing happens when:<br>A)a word is converted into
Q88: In the context of the common intentional
Q89: _ is an attempt to gain access