In cybersecurity, which type of attack involves tampering with data in transit or disrupting communication between systems to bypass security?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

In cybersecurity, which type of attack involves tampering with data in transit or disrupting communication between systems to bypass security?

Explanation:
This question tests the distinction between passive and active attacks. Tampering with data in transit or disrupting communication between systems means the attacker is actively interfering with the data flow, not just listening. Active attacks involve modifying, injecting, replaying, or blocking messages to bypass security controls and affect integrity or availability. By contrast, passive attacks focus on eavesdropping and gathering information without altering the data or disrupting the channel. So tampering or disrupting communications is a hallmark of an active attack, since it directly changes or interrupts the data being exchanged.

This question tests the distinction between passive and active attacks. Tampering with data in transit or disrupting communication between systems means the attacker is actively interfering with the data flow, not just listening. Active attacks involve modifying, injecting, replaying, or blocking messages to bypass security controls and affect integrity or availability. By contrast, passive attacks focus on eavesdropping and gathering information without altering the data or disrupting the channel. So tampering or disrupting communications is a hallmark of an active attack, since it directly changes or interrupts the data being exchanged.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy