Which one of the following is concerned with masking the frequency, length, and origin-destination
patterns of the communications between protocol entities?

A.
Masking analysis
B.
Protocol analysis
C.
Traffic analysis
D.
Pattern analysis
Explanation:
Traffic analysis, which is sometimes called trend analysis, is a technique employed
by an intruder that involves analyzing data characteristics (message length, message frequency,
and so forth) and the patterns of transmissions (rather than any knowledge of the actual
information transmitted) to infer information that is useful to an intruder) . -Ronald Krutz The
CISSP PREP Guide (gold edition) pg 323
check
0
0