New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 18 Topic 2 Discussion

ECCouncil EC-Council Certified Security Specialist (ECSSv10)Exam ECSS Question # 18 Topic 2 Discussion

ECSS Exam Topic 2 Question 18 Discussion:
Question #: 18
Topic #: 2

Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob’s system. Using this technique. Michael can extract sensitive information from unencrypted data.

Identify the class of attack Michael has launched in the above scenario.


A.

Ac live attack


B.

Insider attack


C.

Close in attack


D.

Passive attack


Get Premium ECSS Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.