Author Question: Which of the following hacker tricks involves launching software that monitors all traffic looking ... (Read 26 times)

sheilaspns

  • Hero Member
  • *****
  • Posts: 567
Which of the following hacker tricks involves launching software that monitors all traffic looking for passwords or other valuable information?
 
  A)
 
  Man-in-the-middle
  B)
 
  Denial of service
  C)
 
  Trojan horse
  D)
 
  Network sniffing

Question 2

One approach to object-oriented design is a(n) ________ approach.
 
  A) component-based
  B) object-based
  C) system-based
  D) structural



Carissamariew

  • Sr. Member
  • ****
  • Posts: 359
Answer to Question 1

D

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Less than one of every three adults with high LDL cholesterol has the condition under control. Only 48.1% with the condition are being treated for it.

Did you know?

The most dangerous mercury compound, dimethyl mercury, is so toxic that even a few microliters spilled on the skin can cause death. Mercury has been shown to accumulate in higher amounts in the following types of fish than other types: swordfish, shark, mackerel, tilefish, crab, and tuna.

Did you know?

The first oncogene was discovered in 1970 and was termed SRC (pronounced "SARK").

Did you know?

Certain rare plants containing cyanide include apricot pits and a type of potato called cassava. Fortunately, only chronic or massive ingestion of any of these plants can lead to serious poisoning.

Did you know?

To combat osteoporosis, changes in lifestyle and diet are recommended. At-risk patients should include 1,200 to 1,500 mg of calcium daily either via dietary means or with supplements.

For a complete list of videos, visit our video library