1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
7

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor

mation or gather credentials that can be used to extend the attack?
Computers and Technology
1 answer:
Alex_Xolod [135]3 years ago
4 0

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

You might be interested in
Type the correct answer in the box. Spell the words correctly.
ExtremeBDS [4]

Answer:

The IT field yeah am sure

7 0
3 years ago
What is a space flight that doesn’t complete a full orbit referred to as?
Vikentia [17]

Answer:

A flight that does not reach space is still sometimes called suborbital, but is not a 'suborbital spaceflight'. Usually a rocket is used, but experimental sub-orbital spaceflight has also been achieved with a space gun.

Explanation:

3 0
3 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
3 years ago
Read 2 more answers
why might you want to use the send to compressed (zipped) folder command before sending four pictures to a friend via email
IceJOKER [234]

It's easier to send the files that way because you don't have to attach them individually, and then your friend won't have to download them individually - they can just download the zip package and have all four right at their disposal.

6 0
3 years ago
I wake up the computer and remind it what to do ​
kirza4 [7]

Answer:

what's the question or answer you want or is it a joke?

Explanation:

6 0
2 years ago
Other questions:
  • For some people , alcohol can cause an uncontrollable blank of the eyes , making good vision almost impossible
    5·1 answer
  • Alex's woodworking shop is trying to design a web page with Cascading Style Sheets (CSS). Alex would like create the new design
    11·1 answer
  • Consider a relation BOOKS that holds information about the inventory of books (used or new) in a bookstore with attributes (titl
    14·1 answer
  • Which of the following does NOT help a user navigate through a document?
    14·1 answer
  • In which of the following work situations would word processing software be most appropriate to make the task easier?
    6·1 answer
  • What is an Algorithm? (might not be in the chapter text). Give an example.
    13·1 answer
  • You need to update your router settings, so you log into the administration panel, Whose Internet protocol (IP) address is 192.1
    5·1 answer
  • ____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t
    10·2 answers
  • Discuss the concept of the “state of a process”. Give examples to illustrateyour answers?
    5·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!