Spread the word.

Share the link on social media.

Share
  • Facebook
Have an account? Sign In Now

Sign Up Sign Up

Browse


Have an account? Sign In Now

Sign In Sign In


Forgot Password?

Don't have account, Sign Up Here

Forgot Password Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have a permission to ask a question, You must login to ask question.


Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have a permission to add a post.


Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Question & Answers Logo Question & Answers Logo
Sign InSign Up

Question & Answers

Question & Answers Navigation

  • Home
  • Blog
  • Contact Us
  • Real Time Solution
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Terms of Use
  • Privacy Policy
  • Cookie Policy
Home/ Questions/Q 3385
Next
Answered
Jemshah
  • 0
JemshahEnlightened
Asked: January 7, 20232023-01-07T10:39:43+00:00 2023-01-07T10:39:43+00:00In: Introduction to ICT questions

A certain institution connected their computers to a Wide Area Network and experienced some passive network threats. Outline four such threats. (4 marks)July 2020

  • 0

A certain institution connected their computers to a Wide Area Network and
experienced some passive network threats. Outline four such threats. (4 marks)July 2020

  • 1 1 Answer
  • 61 Views
  • 0 Followers
  • 0
    • Report
  • Share
    Share
    • Share on Facebook
    • Share on Twitter
    • Share on LinkedIn
    • Share on WhatsApp

You must login to add an answer.


Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Best Answer
    Jemshah Enlightened
    2023-01-07T10:40:46+00:00Added an answer on January 7, 2023 at 10:40 am

    There are several passive network threats that a institution may experience when connecting their computers to a Wide Area Network (WAN):

    1. Eavesdropping: This is the act of intercepting and listening to communication between two or more parties without their knowledge or consent. On a WAN, this could involve an attacker intercepting and reading sensitive data such as passwords or confidential documents.
    2. Traffic analysis: This is the act of collecting and analyzing information about the flow of data on a network, in order to infer sensitive information about the network or its users. On a WAN, this could involve an attacker analyzing the patterns of network traffic in order to identify sensitive data or activities.
    3. Masquerading: This is the act of disguising oneself as a legitimate user in order to gain unauthorized access to a network or system. On a WAN, this could involve an attacker using a fake or stolen identity to gain access to restricted resources.
    4. Replay attacks: This is the act of intercepting and reusing previously transmitted data in order to gain unauthorized access to a network or system. On a WAN, this could involve an attacker intercepting and reusing a user’s login credentials to gain access to restricted resource
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 1k
  • Answers 1k
  • Best Answers 744
  • Users 292
  • Popular
  • Answers
  • Ambogo

    Amplitude modulation calculations

    • 1476 Answers
  • Jemshah

    Nyquist data sampling rate in pulse code modulation (PCM).

    • 26 Answers
  • Anonymous

    elecromagnetic field theory

    • 21 Answers
  • oradentum
    oradentum added an answer oradentum is a comprehensive 21-in-1 oral care formula designed to… May 16, 2025 at 12:47 am
  • oradentum
    oradentum added an answer oradentum is a comprehensive 21-in-1 oral care formula designed to… May 16, 2025 at 12:47 am
  • oradentum
    oradentum added an answer oradentum is a comprehensive 21-in-1 oral care formula designed to… May 14, 2025 at 6:08 am

Related Questions

  • Jemshah

    What are the challenges that an organisation may face when ...

    • 1 Answer
  • Jemshah

    Distinguish between the caps lock and num lock keys of ...

    • 1 Answer
  • Jemshah

    Explain the function of each of the following sections found ...

    • 1 Answer

Top Members

Jemshah

Jemshah

  • 1k Questions
  • 992 Points
Enlightened
Obadiah

Obadiah

  • 0 Questions
  • 22 Points
Begginer
CK FELIX

CK FELIX

  • 0 Questions
  • 22 Points
Begginer

Trending Tags

analytics british company computer developers diploma in electrical module one (oct/nov 2016) diploma in electrical module one com skills question 1 (oct/ nov 2016) diploma in electrical module one q7(a) (oct/nov 2016) django eft employee employer english facebook french google interview javascript language life php programmer programs question salary telecom timber design university

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • Buy Theme

Footer

Question & Answers

Quizhez is a social questions & Answers Engine which will help you establish your community and connect with other people.

About Us

  • Meet The Team
  • Blog
  • Contact Us

Legal Stuff

  • Terms of Use
  • Privacy Policy
  • Cookie Policy

Help

  • Knowledge Base
  • Support

Follow

© 2021 Quizhez. All Rights Reserved. Designed by thekasengeweb