Author Question: Which of the following hacker tricks involves launching software that monitors all traffic looking ... (Read 31 times)

sheilaspns

  • Hero Member
  • *****
  • Posts: 567
Which of the following hacker tricks involves launching software that monitors all traffic looking for passwords or other valuable information?
 
  A)
 
  Man-in-the-middle
  B)
 
  Denial of service
  C)
 
  Trojan horse
  D)
 
  Network sniffing

Question 2

One approach to object-oriented design is a(n) ________ approach.
 
  A) component-based
  B) object-based
  C) system-based
  D) structural



Carissamariew

  • Sr. Member
  • ****
  • Posts: 359
Answer to Question 1

D

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

When blood is exposed to air, it clots. Heparin allows the blood to come in direct contact with air without clotting.

Did you know?

It is believed that humans initially contracted crabs from gorillas about 3 million years ago from either sleeping in gorilla nests or eating the apes.

Did you know?

Approximately 25% of all reported medication errors result from some kind of name confusion.

Did you know?

Adult head lice are gray, about ? inch long, and often have a tiny dot on their backs. A female can lay between 50 and 150 eggs within the several weeks that she is alive. They feed on human blood.

Did you know?

Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing for mass cultivation and purification from bacterial cultures.

For a complete list of videos, visit our video library