NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Eavesdropping
|
|
Hacking
|
|
Impersonation
|
|
Penetration testing
|
Detailed explanation-1: -Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission. The term eavesdrop derives from the practice of actually standing under the eaves of a house, listening to conversations inside.
Detailed explanation-2: -One basic yet common and effective type of eavesdropping has become somewhat of a caricature in popular culture: a small microphone bug secretly planted within a room or phone that records conversations undetected.
Detailed explanation-3: -Eavesdropping attacks happen when cyber criminals or attackers listen in to network traffic traveling over computers, servers, mobile devices and Internet of Things (IoT) devices.