Docsity is not optimized for the browser you're using. In order to have a better experience please switch to Google Chrome, Firefox, Internet Explorer 9+ or Safari!
Download Google Chrome
   Back to the top

Answers (6)

beatryx 13-10-2012
"Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems."
Comment 
agrima 01-11-2012
Passive voice episode: Consequently with passive episode the hack trespasses your digestive system, along with holds back for some valuable facts. An example may very well be: Some sort of keylogger which posts this suggestions provided by this victim to your nuller by way of a system(LAN as well as World-wide-web any(a)). "  
Comment 
Comment 
Comment 
Comment 
Comment 

Add your answer

Up to 3 download points

Related questions