Which of the following is the process used by attackers for listening to the network traffic?

Which of the following is the process used by attackers for listening to the network traffic?

Which of the following is the process used by attackers for listening to the network traffic?

A.
Eavesdropping

B.
Subnetting

C.
Sanitization

D.
Hacking

Explanation:
Eavesdropping is the process of listening to private conversations. It also includes attackers listening
the network traffic. For example, it can be done over telephone lines (wiretapping), email, instant
messaging, and any other method of communication considered private.

Answer C is incorrect. Sanitization is the process of removing sensitive information from a
document or other medium so that it may be distributed to a broader audience. When dealing with
classified information, sanitization attempts to reduce the document’s classification level, possibly
yielding an unclassified document. Originally, the term sanitization was applied to printed
documents; it has since been extended to apply to computer media and the problem of data
remanence as well.

Answer D is incorrect. Hacking is a process by which a person acquires illegal access to a computer
or network through a security break or by implanting a virus on the computer or network.

Answer B is incorrect. Subnetting is a process through which an IP address network is divided into
smaller networks. It is a hierarchical partitioning of the network address space of an organization
into several subnets. Subnetting creates smaller broadcast domains. It helps in the better utilization
of the bits in the Host ID.



Leave a Reply 0

Your email address will not be published. Required fields are marked *