Which of the following is the process used by attackers for listening to the network traffic?

Which of the following is the process used by attackers for listening to the network traffic?

Which of the following is the process used by attackers for listening to the network traffic?

A.
Eavesdropping

B.
Subnetting

C.
Sanitization

D.
Hacking

Explanation:
Eavesdropping is the process of listening to private conversations. It also includes attackers listening
the network traffic. For example, it can be done over telephone lines (wiretapping), email, instant
messaging, and any other method of communication considered private.
document or other medium so that it may be distributed to a broader audience. When dealing with
classified information, sanitization attempts to reduce the document’s classification level, possibly
yielding an unclassified document. Originally, the term sanitization was applied to printed
documents; it has since been extended to apply to computer media and the problem of data
remanence as well.
or network through a security break or by implanting a virus on the computer or network.
smaller networks. It is a hierarchical partitioning of the network address space of an organization
into several subnets. Subnetting creates smaller broadcast domains. It helps in the better utilization
of the bits in the Host ID.



Leave a Reply 1

Your email address will not be published. Required fields are marked *