English, asked by akshatha659, 11 months ago

Which among the following may be considered a covert approach?
1)Collecting private data
2)Generating huge network traffic
3)Draining the device’s battery

Answers

Answered by wajahatkincsem
2

The correct option is 1

Collecting Private Data

Explanation:

  • Nowadays, mobile phones are becoming the primary source for users to store their personal data
  • An attackers targets the inside information of the mobiles such as MMS ans SMS, E-mails and call logs .
  • These acts are parts of covert actions performed to collect the personal information through SIMS and memory cards of one's phones .

Learn more about overt and covert here:

What is behavior? give examples of overt and covert behavior.

https://brainly.in/question/4581433

Answered by mindfulmaisel
0

Collection of private data may be considered a covert approach.

Option: (1)

Explanation:  

  • Covert approach is one in which there is use of one identity or his or her actions are being notated without himself being aware of it. A covert approach may or may not be harmful for him.  
  • For example a covert approach where a teacher keeps a look into the action of his students is good for the student.  
  • However hacking into someone's account is harmful for the user and may cause harm to his privacy. Here Collection of private data is a covert approach.
Similar questions