Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called
A) spoofing
B) spooling
C) dual-homing
D) screening
Correct Answer:
Verified
Q28: A firewall is a hardware partition designed
Q29: The checkpoint feature
A)makes a periodic backup of
Q30: Transaction logs are permanent records of transactions
Q31: Public key encryption
A)uses one key for encoding
Q32: A software program that allows access to
Q34: Electronic data interchange customers may be given
Q35: Passwords are secret codes that users enter
Q36: Which is not a biometric device?
A)password
B)retina prints
C)voice
Q37: Malicious and destructive programs cause millions of
Q38: Audit trails cannot be used to
A)detect unauthorized
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents