Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam DEA-1TT4 topic 1 question 62 discussion

Actual exam question from Dell's DEA-1TT4
Question #: 62
Topic #: 1
[All DEA-1TT4 Questions]

If a company has experienced a passive attack on its IT infrastructure, how is the company's security impacted?

  • A. Access to services is denied.
  • B. Availability of data is affected.
  • C. Information privacy is compromised.
  • D. Data is altered by an unauthorized user.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Seahawk270
Highly Voted 3 years, 7 months ago
Should be C "Passive attacks are attempts to gain unauthorized access into the system. Passive attacks pose threats to confidentiality of information."
upvoted 17 times
...
hakot
Highly Voted 3 years, 6 months ago
I agree, it should be C. D is in my opion an activa attack eplanation: Attacks can be classified as:  Passive attacks attempt to gain unauthorized access into the system  Active attacks attempt data modification, Denial of Service (DoS), and repudiation attacks
upvoted 10 times
...
fishe
Most Recent 2 years ago
Selected Answer: C
In a passive attack no data is altered, therefore C
upvoted 1 times
...
srichard
2 years, 8 months ago
because D is altering DATA, it must be C.
upvoted 3 times
...
bobbyzee
2 years, 10 months ago
Should be C. PASSIVE attacks attempt to gain UNAUTHORIZED ACCESS into the system  ACTIVE attacks attempt DATA MODIFICATION, Denial of Service (DoS), and repudiation attacks
upvoted 2 times
neham19
2 years, 2 months ago
No, altering a data is active but unauthorized access is passive! So its B.
upvoted 1 times
...
...
dotnen
3 years, 2 months ago
D is the correct! Attacks can be classified as:  Passive attacks attempt to gain unauthorized access into the system  Active attacks attempt data modification, Denial of Service (DoS), and repudiation attacks
upvoted 2 times
...
renzitonoda13
3 years, 2 months ago
I am agree, too
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...