Answer (D) is correct . Passwords, user account numbers, and other information may be stolen using techniques such as Trojan horses, IP spoofing, and packet sniffers. Spoofing is identity misrepresentation in cyberspace, for example, by using a false website to obtain information about visitors.
Answer (A) is incorrect because A brute-force attack uses password cracking software to try large numbers of letter and number combinations to access a network. Answer (B) is incorrect because Sniffing is use of software to eavesdrop on information sent by a user to the host computer of a website. Answer (C) is incorrect because A man-in-the-middle attack takes advantage of network packet sniffing and routing and transport protocols to access packets flowing through a network.
|