List of questions
Related questions
Question 49 - ECSS discussion
Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob's system. Using this technique. Michael can extract sensitive information from unencrypted data.
Identify the class of attack Michael has launched in the above scenario.
A.
Ac live attack
B.
Insider attack
C.
Close in attack
D.
Passive attack
Your answer:
0 comments
Sorted by
Leave a comment first