This tactic would best be characterized as:

During a post-mortem incident evaluation, it is discovered that coercion was used by an attacker to infiltrate the company and obtain confidential information. This tactic would best be characterized as:

During a post-mortem incident evaluation, it is discovered that coercion was used by an attacker to infiltrate the company and obtain confidential information. This tactic would best be characterized as:

A.
Eavesdropping

B.
Passive

C.
Active

D.
Sniffing

Explanation:
Using coercion is an active type of attack in which the intruder uses aggressive
tactics to achieve the intended goal. Using coercion is an example of social
engineering, which is an active attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *