Author Question: Which of the following hacker tricks involves launching software that monitors all traffic looking ... (Read 53 times)

sheilaspns

  • Hero Member
  • *****
  • Posts: 567
Which of the following hacker tricks involves launching software that monitors all traffic looking for passwords or other valuable information?
 
  A)
 
  Man-in-the-middle
  B)
 
  Denial of service
  C)
 
  Trojan horse
  D)
 
  Network sniffing

Question 2

One approach to object-oriented design is a(n) ________ approach.
 
  A) component-based
  B) object-based
  C) system-based
  D) structural



Carissamariew

  • Sr. Member
  • ****
  • Posts: 359
Answer to Question 1

D

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

More than nineteen million Americans carry the factor V gene that causes blood clots, pulmonary embolism, and heart disease.

Did you know?

Russia has the highest death rate from cardiovascular disease followed by the Ukraine, Romania, Hungary, and Poland.

Did you know?

Historic treatments for rheumatoid arthritis have included gold salts, acupuncture, a diet consisting of apples or rhubarb, nutmeg, nettles, bee venom, bracelets made of copper, prayer, rest, tooth extractions, fasting, honey, vitamins, insulin, snow collected on Christmas, magnets, and electric convulsion therapy.

Did you know?

Not getting enough sleep can greatly weaken the immune system. Lack of sleep makes you more likely to catch a cold, or more difficult to fight off an infection.

Did you know?

In 1886, William Bates reported on the discovery of a substance produced by the adrenal gland that turned out to be epinephrine (adrenaline). In 1904, this drug was first artificially synthesized by Friedrich Stolz.

For a complete list of videos, visit our video library