McqMate
| Q. |
Spoofing attack is |
| A. | an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. |
| B. | a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. |
| C. | a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. |
| D. | None of these |
| Answer» C. a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. | |
View all MCQs in
Computer Security