An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

1 Answer

Answer :

(B) Replay Attack

Related questions

Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

Last Answer : (A) Denial of service attack 

Description : What to do when Milo sits, stares, pounces, stabs and captures?

Last Answer : I’d be happier with a piece of fried chicken but not a dead duck. I guess with all the woods and wildlife here, I cannot prevent this with an outdoor cat, can I?

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Explain denial of service attack. -Technology

Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.

Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack

Last Answer : c) Patent

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off

Last Answer : c. To overload a system so it is no longer operational

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above

Last Answer : A)Attachment Overloading Attack

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above

Last Answer : B. Auto responder Attack

Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above

Last Answer : A)Attachment Overloading Attack

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : ask-public masquerade ball; would you participate?

Last Answer : answer:That’s a pretty damned big restriction. You could say it restricts you to exactly one thing: Your biggest fear. In which case I would be dressed up as an oxygen-free environment.

Description : What should I know about throwing a surprise masquerade party for my wife's 30th birthday?

Last Answer : What a nice husband you are to do this for your wife! We entertain a lot, and even after having done it many times pulling a party of this magnitude together is no easy task. I would ... using a facility with a ballroom as you mentioned, they will most definitely have an event coordinator on staff.

Last Answer : Written by Shawkat Osman.

Description : What song relates to the character named lupe alagrin in the Bronx masquerade?

Last Answer : What songs relate to characters in bronx masquerade

Description : Data cannot flow between two data stores because A) it is not allowed in DFD B) a data store is a passive repository of data C) data can get corrupted D) they will get merged

Last Answer : D) they will get merged

Description : The digital evidences are used to establish a credible link between a) Attacker and victim and the crime scene b) Attacker and the crime scene c) Victim and the crime scene d) Attacker and Information

Last Answer : a) Attacker and victim and the crime scene

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information

Last Answer : a. Attacker and victim and the crime scene

Description : The digital avoidance are use to stablish a credible link between (a) Attacker and victim and crime scene (b) Attacker and the crime scene (c) Victim and crime scene (d) Attacker and information.

Last Answer : (c) Victim and crime scene

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : ______ is the opinion of the rating agency on the relative ability and willingness of the issuer of the debt instrument to meet the debt service obligation as and when the arise. (a) merit rating b) credit rating c) rating by merchant banker )

Last Answer : (a) merit rating

Description : Do you think that to beat someone at chess, you have to replay, hypothetically, all the possible combinations of the board, or to cold read the person in front of you?

Last Answer : Certainly not. The first choice quickly becomes impossible, and depending on tricks such as reading your opponent is stupid. It’s the quality of your opponent’s play that you must read.

Description : Why won't 8 tracks let me replay the mix?

Last Answer : answer:What happens when you don’t refresh the page? Is there a repeat button on the player?

Description : How can I replay a received text to landline message?

Last Answer : I’m not sure I understand the question…can you explain more?

Description : If you could re-play any part of your life what part would you replay?

Last Answer : The part where I answered this question.

Description : Software for Nindendo DS action replay?

Last Answer : From all that I have been able to find, there is no way for you to make your own Action Replay DS codes. This is because the Action Replay actually modifies the code of the game that you are using ... you can use is us.codejunkies.com, which is the official site for the Action Replay and it's codes

Description : Is there a replay of tonight's Democratic presidential debate?

Last Answer : answer:Its on at 8PM EST. Heres your replay. Hillary; “I want socialism.” Obama: “No, I want socialism more.”

Last Answer : to it Says Auto Replay. On To do For Computer If Good Is Then That On the page Auto Reply On To do Want In that Going Left Next to Stay Settings Options Click Please. Then Many Options Will ... Even if The sender Automatically Yours Of choice The message Getting Go. Hope I do To understand Got it.

Description : Is there any Action Replay Max Codes for NFS Undercover for PS2?

Last Answer : Need answer

Description : I have read about Datel's Action Replay for Gamecube. Does it really work If so, are there lots of new cheats available on it?

Last Answer : The Datel Action Replay works extremely well. Not only does it allow the use of cheat codes and modifications to game save data to allow completion of games quicker, but some models also allow ... secret developer debug menus to explore parts of the game that were never completed by the programmers.

Description : Animal which captures and readily kills living animals for its food is called------? A. Parasite B. Scavenger C. Predator (Answer) D. Mammal E. None of these

Last Answer : C. Predator (Answer)

Description : Is there a single word that captures human level consciousness, sentience, sapience and self-awareness?

Last Answer : “pathetic”

Description : How and when nationalism captures the hearts and minds of the people ? -SST 10th

Last Answer : When people begin to believe strongly that they are part of the same nation. Also, when they discover common bonds that unite them, when they share the same struggles and have a common folklore, history and culture, then nationalism grips their hearts and minds.

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : 27. The mathematical model of an LP problem is important because a. It helps in converting the verbal description & numerical data into mathematical expression b. Decision-makers prefer to ... captures the relevant relationship among decision factors d. It enables the use of algebraic technique

Last Answer : a. It helps in converting the verbal description & numerical data into mathematical expression

Description : Which of the following sentences best captures the main argument of the writer? (1) Many Indians are capable of using English like any Englishman. (2) Learning English is as difficult as learning any other ... (4) An Indian can learn English in half the time taken by an Englishman to learn Greek.

Last Answer : (3) The importance of English education needs to be recognised by the supporters of oriental learning.

Description : Which of the following records logons and deletions? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : c. Log analysis tools

Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software

Last Answer : d. Screen capture software

Description : What is the process by which a cell captures and digests a foreign body?

Last Answer : ANSWER: PHAGOCYTOSIS (pron: fag-a-se-TOE-sis)

Description : Insurance Claim Denial Information?

Last Answer : Get StartedIf your insurance company has denied your claim, you should have been sent an Explanation of Benefits (EOB). Read this document carefully to determine the reason for the denial. Your insurer may ... phone the insurance company, be sure to write down the name of the person you spoke wit