PdfPrep.com

Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?

Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?
A . Traffic analysis
B . SYN flood
C . Denial of service (DoS)
D . Distributed denial of service (DoS)

Answer: A

Explanation:

Traffic analysis is a passive attack method used by intruders to determine potential network vulnerabilities. All others are active attacks.

Exit mobile version