Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
In what ways do active attacks affect a system?
Integrity
Confidentiality
Authenticity
Availability
Both active and passive attacks are used on network security infrastructures and on hosts.
Active attacks actually alter the system or network they’re attacking, whereas passive attacks attempt to gain information from the system. Active attacks affect the availability, integrity, and authenticity of data; passive attacks are breaches of confidentiality.
Note that this is different than active and passive reconnaissance. Passive Recon. doesn't actually touch the system and gains information via 3rd party websites like google, facebook, twitter etc. Active Recon. touches the system via scanning, scraping or footprinting. (examples are non-exhaustive)
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.