PrepAway - Latest Free Exam Questions & Answers

A perpetrator looking to gain access to and gather information about encrypted data being transmitted over the

A perpetrator looking to gain access to and gather information about encrypted data
being transmitted over the network would use:

PrepAway - Latest Free Exam Questions & Answers

A.
eavesdropping.

B.
spoofing.

C.
traffic analysis.

D.
masquerading.

Explanation:

In traffic analysis, which is a passive attack, an intruder determines the nature of the traffic flow
between defined hosts and through an analysis of session length, frequency and message length,
and the intruder is able to guess the type of communication taking place. This typically is used
when messages are encrypted and eavesdropping would not yield any meaningful results, in
eavesdropping, which also is a passive attack, the intruder gathers the information flowing through
the network withthe intent of acquiring and releasing message contents for personal analysis or for
third parties. Spoofing and masquerading are active attacks, in spoofing, a user receives an e-mail
that appears to have originated from one source when it actually was sent from another source. In
masquerading, the intruder presents an identity other than the original identity.


Leave a Reply