During a post-mortem incident evaluation, it is discovered that coercion was used by an attacker to infiltrate the company and obtain confidential information. This tactic would best be characterized as:
A.
Eavesdropping
B.
Passive
C.
Active
D.
Sniffing
Explanation:
Using coercion is an active type of attack in which the intruder uses aggressive
tactics to achieve the intended goal. Using coercion is an example of social
engineering, which is an active attack.