Drag the network attack technique on the left to the appropriate description or example on the right. (each technique may be used once, more than once, or not at all.)
[Perpetrators attempt to compromise or affect the operations of a system.] Active attack [Unauthorized individuals try to breach a network from off-site.] External attack [Attempting to find the root password on a web server by brute force.] Active attack [Attempting to gather information without affecting the flow of information on the network.] Passive attack [Sniffing network packets or performing a port scan.] Passive attack

Respuesta :

Otras preguntas