COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
masquerade
|
|
Replay
|
|
Denial of Service
|
|
Traffic Analysis
|
Detailed explanation-1: -Answer: ==> Traffic analysis Explain: Traffic analysis is not an active attack.
Detailed explanation-2: -2 Answers. Traffic analysis is not an active attack. Denial of services refers to making the data inaccessible or unavailable.
Detailed explanation-3: -1 Passive Attacks. Some types of passive attacks are release of message content and traffic analysis. A malicious node in MANET executes a passive attack, without actively initiating malicious actions.
Detailed explanation-4: -Examples of active attacks include man-in-the middle (MitM), impersonation, and session hijacking. An attack on the authentication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP).