Which one of the following is a passive network attack?
A.
Spoofing
B.
Traffic Analysis
C.
Playback
D.
Masquerading
Explanation:
“Traffic analysis and trend analysis are forms of monitoring that examine the flow of packets rather
than the actual content of packets. Traffic and trend analysis can be used to infer a large amount of
information, such as primary communication routes, sources of encrypted traffic, location of primaryservers, primary and backup communication pathways, amount of traffic supported by the network,
typical direction of traffic flow, frequency of communications, and much more.” Pg 429 Tittel: CISSP
Study Guide