Which of the following is a passive attack to a network?

A.
Message modification
B.
Masquerading
C.
Denial of service
D.
Traffic analysis
Explanation:
The intruder determines the nature of the flow of traffic (traffic analysis) between defined hosts and
is able to guess the type of communication taking place. Message modification involves the
capturing of a message and making unauthorized changes or deletions, changing the sequence ordelaying transmission of captured messages. Masquerading is an active attack in which the
intruder presents an identity other than the original identity. Denial of service occurs when a
computer connected to thelnternet is flooded with data and/or requests that must be processed.