Which of the following is a passive attack method used by intruders to determine potential network
vulnerabilities?

A.
Traffic analysis
B.
SYN flood
C.
Denial of service (DoS)
D.
Distributed denial of service (DoS)
Explanation:
Traffic analysis is a passive attack method used by intruders to determine potential
network vulnerabilities. All others are active attacks.