Which among the following may be considered a covert approach?
1)Collecting private data
2)Generating huge network traffic
3)Draining the device’s battery
Answers
Answered by
2
The correct option is 1
Collecting Private Data
Explanation:
- Nowadays, mobile phones are becoming the primary source for users to store their personal data
- An attackers targets the inside information of the mobiles such as MMS ans SMS, E-mails and call logs .
- These acts are parts of covert actions performed to collect the personal information through SIMS and memory cards of one's phones .
Learn more about overt and covert here:
What is behavior? give examples of overt and covert behavior.
https://brainly.in/question/4581433
Answered by
0
Collection of private data may be considered a covert approach.
Option: (1)
Explanation:
- Covert approach is one in which there is use of one identity or his or her actions are being notated without himself being aware of it. A covert approach may or may not be harmful for him.
- For example a covert approach where a teacher keeps a look into the action of his students is good for the student.
- However hacking into someone's account is harmful for the user and may cause harm to his privacy. Here Collection of private data is a covert approach.
Similar questions