An Internet-based attack using password sniffing can:

A. enable one party to act as if they are another party.

B. cause modification to the contents of certain transactions.

C. be used to gain access to systems containing proprietary
information.

D. result in major problems with billing systems and
transaction processing agreements.

Answer Posted / guest

Answer: C

Password sniffing attacks can be used to gain access to
systems on which proprietary information is stored. Spoofing
attacks can be used to enable one party to act as if they
are another party. Data modification attacks can be used to
modify the contents of certain transactions. Repudiation of
transactions can cause major problems with billing systems
and transaction processing agreements.

Is This Answer Correct ?    8 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2838


purchase orders issued to vendors have been authorized as per the authorization matrix

1089