1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
14

After reviewing device security you learn that a malicious user in an airport

Computers and Technology
1 answer:
NARA [144]3 years ago
4 0

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

You might be interested in
Which part of the Word application window should the user go to for the following activities?
garri49 [273]

<u>Answer:</u>

<u>Correct</u>

<u>Explanation:</u>

Indeed, the world application is a word processing software used by many professionals and students alike.

Read a document: To do this, the user should go to the document area  found at the top left corner of the tool bar.

Find the name of the document: By looking at the Title bar.

Change the way a document is viewed: The Ribbon area is located at the top right section of the screen near the minimize icon.

Find help to do a certain activity on word: Close to the Ribbon area there is a dialog box having the image of a bulb.

Go up and down to different parts of a document: By going to the scroll bar which found at the extreme right hand side (margin) of the page.

Determine the page number of the document: By going to the Status bar found at the bottom right of the page.

3 0
3 years ago
Which TWO choices are NOT examples of productivty software (choose two)
Svetradugi [14.3K]

Productivity Software

Norton Antivirus and Instant Messenger are not example of productivity software

Explanation:

Google docs, Excel and Presentation software are categorized as productivity software. Productivity software include word processing programs, spreadsheet,  presentation software ,graphic design programs.Among the given choices, Norton Antivirus is a type of antivirus and security software for PC and laptops. Instant Messenger is an example of communication software used for text-based communication between two or more participants over the Internet or other types of networks. It allows efficient as wells effective communication, allowing immediate receipt of reply or acknowledgment.

So Norton Antivirus and Instant Messenger are NOT examples of Productivity software.

3 0
3 years ago
Why laptop computer is called micro computer?​
4vir4ik [10]

Answer:

its not

Explanation:

5 0
3 years ago
Pasar el número 12875 del sistema decimal al sistema octal.
PolarNik [594]

Answer:

Va Bene

Explanation:

Insiama ma parla da auditore

4 0
3 years ago
Computer viruses often spread by means of what?
just olya [345]
Emails, pop-ups and advertisements usually spread computer viruses.
3 0
3 years ago
Other questions:
  • A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
    12·1 answer
  • P3. In Section 4.2 , we noted that the maximum queuing delay is (n–1)D if the switching fabric is n times faster than the input
    8·1 answer
  • All it services and servers are equally critical. <br> a. True <br> b. False
    9·1 answer
  • Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the info
    5·1 answer
  • Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
    15·2 answers
  • Assume that month is an int variable whose value is 1 or 2 or 3 or 5 ... or 11 or 12. Write an expression whose value is "jan" o
    10·1 answer
  • What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
    13·1 answer
  • Which country was the first in the world to launch a mass media campaign in response to population growth?
    14·1 answer
  • 3.6 Code Practice on Edhesive
    10·1 answer
  • Define a function Output Value() that takes two integer parameters and outputs the sum of all negative integers starting with th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!