Which of the following is a passive attack method used …

Which of the following is a passive attack method used by intruders to determine potential network
vulnerabilities?

Which of the following is a passive attack method used by intruders to determine potential network
vulnerabilities?

A.
Traffic analysis

B.
SYN flood

C.
Denial of service (DoS)

D.
Distributed denial of service (DoS)

Explanation:
Traffic analysis is a passive attack method used by intruders to determine potential network vulnerabilities. All
others are active attacks.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

7 + seven =