ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 18 Topic 2 Discussion

ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 18 Topic 2 Discussion

ECSS Exam Topic 2 Question 18 Discussion:
Question #: 18
Topic #: 2

Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob’s system. Using this technique. Michael can extract sensitive information from unencrypted data.

Identify the class of attack Michael has launched in the above scenario.


A.

Ac live attack


B.

Insider attack


C.

Close in attack


D.

Passive attack


Get Premium ECSS Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.