Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?
A . Traffic analysis
B . SYN flood
C . Denial of service (DoS)
D . Distributed denial of service (DoS)

Answer: A

Explanation:

Traffic analysis is a passive attack method used by intruders to determine potential network vulnerabilities. All others are active attacks.

Leave a Reply

Your email address will not be published.