Froggy Jumps Security ThreatsVersión en línea This section introduces you to the most common threats to data confidentiality, integrity, and availability. por Mr. B 1 A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network. a Snooping b Wiretapping c Social Engineering 2 The passive gathering of information about a potential victim a Email Attack b Pretexting c Reconnaissance 3 Attempting to secretively discover private information about a person, company, or other entity. a Snooping b Wiretapping c Social Engineering 4 Exploiting a victim using email messages. a Reconnaissance b Pretexting c Email Attack 5 The use of deception to gain personal and/or private information for unlawful purposes. a Snooping b Wiretapping c Social Engineering 6 An attempt to connect to a server by capturing and resending authentication information. a Man-in-the-Middle Attack b Browser Attack c Replay Attack 7 An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information. a Password Attack b Malware c Denial of Service 8 Tricking a victim into revealing sensitive information under false pretenses a Reconnaissance b Pretexting c Email Attack 9 Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer. a Browser Attack b Replay Attack c Email Attack 10 An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other. a Man-in-the-Middle Attack b Browser Attack c Denial of Service 11 An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients. a Password Attack b Malware c Denial of Service