Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-38 Topic 7 Question 81 Discussion

Actual exam question for Eccouncil's 312-38 exam
Question #: 81
Topic #: 7
[All 312-38 Questions]

Xenon is a leading real estate firm located in Australi

a. Recently, the company had decided a bid

amount for a prestigious construction project and was sure of being awarded the project. Unfortunately,

the company lost the tender to one of its competitors. A few days later, while performing a network

scan, the network admin identified that somebody had captured the confidential e-mails conversions

related to the tender. Upon further investigation, the admin discovered that one of the switch ports was

left open and an employee had plugged into the network using an Ethernet cable.

Which attack did the employee perform in the above situation?

Show Suggested Answer Hide Answer
Suggested Answer: A

In the scenario described, the employee performed aNetwork Sniffingattack. This type of attack involves capturing and analyzing packets traveling through a network. Since the admin discovered that confidential emails related to the tender were captured and that an open switch port was used to connect to the network, it indicates that the data was intercepted as it traveled across the network, which is characteristic of a sniffing attack. Network sniffing can be either passive or active; however, the scenario suggests a passive approach where the packets were monitored and captured without altering the network traffic.


Contribute your Thoughts:

Tamra
7 months ago
Definitely Network Sniffing. The switch port being open made packet capturing easy for the employee.
upvoted 0 times
...
Dan
7 months ago
I agree with Network Sniffing fits because the employee used an Ethernet cable to capture packets.
upvoted 0 times
...
Lorenza
7 months ago
Man-in-the-Middle involves real-time interception. Here, it seems they captured emails over time.
upvoted 0 times
...
Johnna
7 months ago
What makes you say that? I'm leaning towards Man-in-the-Middle Attack.
upvoted 0 times
...
Adria
7 months ago
Yeah, it's a classic case. I believe the answer is Network Sniffing. The employee intercepted the data packets.
upvoted 0 times
...
Lorenza
7 months ago
I think the question is quite interesting. The company lost the bid because of a security breach.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77