Multiple Choice
____ involves the capture of network traffic by attackers looking for important data files and to obtain passwords in order to penetrate a network.
A) Repudiation
B) Network traffic sniffing
C) Identity spoofing
D) Denial of service
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: List three authentication protocols supported by Windows
Q23: The term _ refers to a form
Q24: What is the purpose of the System
Q25: Briefly describe the following network profiles: Public,
Q27: _ provides hard drive-based encryption of servers
Q28: When a user encrypts a file, a
Q28: All forms of NTLM use the _.<br>A)challenge-response
Q29: With _, each user has a public
Q35: Windows Server 2008 has two tools for
Q39: EFS uses a combination of private and