in Technology by

Which among the following is an active attack?

(1)Accessing restricted data

(2)User Impersonation

(3)Eavesdropping on network traffic

(4)Release of message content

1 Answer

0 votes
by
Answer:-(2)User Impersonation

Related questions

0 votes
    Which of the following case comes under victims' list of an active online attack? (a) Strong password based ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In an _________________ attack, an attacker finds an active session & takes over that session. (a) network ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which among the following best describes hash collision attack? (1)Different hash results when the same input is hashed ... hash result (4)Same input string, different hash results...
asked Mar 19, 2021 in Technology by JackTerrance
0 votes
    Which of them is not a disadvantage of active online attack? (a) Takes a long time (b) Easily and ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Competitive information gathering if done in the form of active attack using malware or by other illicit means can put ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Among the following, the active element of electrical circuit is ____________ (a) Voltage source (b) Current source ... EC Exam, Network Theory MCQ (Multiple Choice Questions)...
asked Oct 20, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the following is an attack against availability? (1)DoS Attack (2)Birthday Attack (3)Zero Day Attack (4)Man in the Middle Attack...
asked Mar 22, 2021 in Technology by JackTerrance
0 votes
    Which of the following is an example of passive online attack? (a) Phishing (b) Social Engineering (c) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of a passive online attack? (a) MiTM (b) Reply Attack (c) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of offline password attack? (a) Dictionary attack (b) Rainbow ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an advantage of dictionary attack? (a) Very fast (b) Time-saving (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of non-technical attack techniques? (a) Shoulder surfing (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of active reconnaissance? (a) Searching public records (b) Telephone calls as ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is an Active element? (a) Resistor (b) Inductor (c) Capacitor (d) OP-AMP This question ... for GATE EC Exam, Network Theory MCQ (Multiple Choice Questions)...
asked Oct 20, 2021 in Education by JackTerrance
...