The laptop of an attacker is attached to a corporate network. The attacker is examining all of the network traffic that is passing through the network interface card. Which network reconnaissance method does this scenario describe?
- penetration exercise
- red team blue team
- sniffing
- bug bounty
Explanation: Sniffing is effectively electronic eavesdropping on a network. It occurs when someone is examining all network traffic as it passes through their NIC, independent of whether the traffic is addressed to them or not. Criminals accomplish network sniffing using software, hardware, or a combination of the two.
Exam with this question: Cyber Threat Management - 2.5.2 Network Security Testing Quiz
Exam with this question: Cyber Threat Management: My Knowledge Check Answers
Please login or Register to submit your answer