CompTIA Security+ Exam Prep

Category - Operations

There are many different types of computer crimes that can be committed with different methods. What method would include tracking and exploiting network traffic?
  1. Excessive Privileges
  2. Data Diddling
  3. Password Sniffing
  4. IP Spoofing
Explanation
Answer: C - The computer crime method that includes tracking and exploiting network traffic is password sniffing. Several tools are available on the Internet that provide this functionality. Capturing a password is tricky because it is a piece of data that is usually only used when a user wants to authenticate into a domain or access a resource. Some systems and applications do send passwords over the network in clear text, but a majority of them do not anymore.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz