Multiple Choice
Which activity is used legitimately by companies to monitor network traffic, but may also be used illegally to capture confidential information?
A) Sniffing
B) Spoofing
C) Hijacking
D) Impersonation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: Which of the following is a unique
Q23: Which of the following are controls over
Q24: A risk assessment should:<br>A) Identify the risk
Q25: Fraud risks are higher in e-commerce settings
Q26: All of the following make it easier
Q28: Separation of duties falls under which of
Q29: Using techniques to gain passwords and other
Q30: Defrauding people through e-business is generally _
Q31: Which of the following is not a
Q32: Viewing information that passes along a network