{"id":92621,"date":"2025-06-01T11:29:18","date_gmt":"2025-06-01T11:29:18","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=92621"},"modified":"2025-06-01T11:29:18","modified_gmt":"2025-06-01T11:29:18","slug":"eavesdropping-is-a-computer-fraud-technique-to","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/","title":{"rendered":"Eavesdropping is a computer fraud technique to"},"content":{"rendered":"<p>Eavesdropping is a computer fraud technique to<\/p>\n<p>[amp_mcq option1=&#8221;listen to private voice or data transmission.&#8221; option2=&#8221;prevent the system from processing or responding to the legitimate users.&#8221; option3=&#8221;disable the network connectivity.&#8221; option4=&#8221;delete data.&#8221; correct=&#8221;option1&#8243;]<\/p>\n<div class=\"psc-box-pyq-exam-year-detail\">\n<div class=\"pyq-exam\">\n<div class=\"psc-heading\">This question was previously asked in<\/div>\n<div class=\"psc-title line-ellipsis\">UPSC CISF-AC-EXE &#8211; 2018<\/div>\n<\/div>\n<div class=\"pyq-exam-psc-buttons\"><a href=\"\/pyq\/pyq-upsc-cisf-ac-exe-2018.pdf\" target=\"_blank\" class=\"psc-pdf-button\" rel=\"noopener\">Download PDF<\/a><a href=\"\/pyq-upsc-cisf-ac-exe-2018\" target=\"_blank\" class=\"psc-attempt-button\" rel=\"noopener\">Attempt Online<\/a><\/div>\n<\/div>\n<section id=\"pyq-correct-answer\">\nThe correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network.<br \/>\n<\/section>\n<section id=\"pyq-key-points\">\n&#8211; Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow.<br \/>\n&#8211; It is a breach of confidentiality, one of the key principles in computer security.<br \/>\n&#8211; Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.<br \/>\n<\/section>\n<section id=\"pyq-additional-information\">\nOptions (B), (C), and (D) describe other types of malicious activities:<br \/>\n&#8211; (B) preventing the system from processing or responding to legitimate users is characteristic of a Denial-of-Service (DoS) attack.<br \/>\n&#8211; (C) disabling network connectivity can be a form of DoS attack or physical sabotage.<br \/>\n&#8211; (D) deleting data is a form of data tampering or destruction, related to breaches of integrity and availability.<br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Eavesdropping is a computer fraud technique to [amp_mcq option1=&#8221;listen to private voice or data transmission.&#8221; option2=&#8221;prevent the system from processing or responding to the legitimate users.&#8221; option3=&#8221;disable the network connectivity.&#8221; option4=&#8221;delete data.&#8221; correct=&#8221;option1&#8243;] This question was previously asked in UPSC CISF-AC-EXE &#8211; 2018 Download PDFAttempt Online The correct answer is (A) listen to private voice &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Eavesdropping is a computer fraud technique to\" class=\"read-more button\" href=\"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/#more-92621\">Detailed Solution<span class=\"screen-reader-text\">Eavesdropping is a computer fraud technique to<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1089],"tags":[1114,1113],"class_list":["post-92621","post","type-post","status-publish","format-standard","hentry","category-upsc-cisf-ac-exe","tag-1114","tag-information-and-communication-technology","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Eavesdropping is a computer fraud technique to<\/title>\n<meta name=\"description\" content=\"The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network. - Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow. - It is a breach of confidentiality, one of the key principles in computer security. - Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eavesdropping is a computer fraud technique to\" \/>\n<meta property=\"og:description\" content=\"The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network. - Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow. - It is a breach of confidentiality, one of the key principles in computer security. - Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T11:29:18+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Eavesdropping is a computer fraud technique to","description":"The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network. - Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow. - It is a breach of confidentiality, one of the key principles in computer security. - Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/","og_locale":"en_US","og_type":"article","og_title":"Eavesdropping is a computer fraud technique to","og_description":"The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network. - Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow. - It is a breach of confidentiality, one of the key principles in computer security. - Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.","og_url":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2025-06-01T11:29:18+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/","url":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/","name":"Eavesdropping is a computer fraud technique to","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2025-06-01T11:29:18+00:00","dateModified":"2025-06-01T11:29:18+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"description":"The correct answer is (A) listen to private voice or data transmission. Eavesdropping, in the context of computer security and networks, refers to the unauthorized interception of private communications, such as data packets or voice calls, being transmitted over a network. - Eavesdropping is a passive attack, meaning the attacker intercepts data without altering it or disrupting the communication flow. - It is a breach of confidentiality, one of the key principles in computer security. - Common methods include packet sniffing, wiretapping (in a broader sense extending to network cables), and intercepting wireless signals.","breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/eavesdropping-is-a-computer-fraud-technique-to\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"UPSC CISF-AC-EXE","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/upsc-cisf-ac-exe\/"},{"@type":"ListItem","position":3,"name":"Eavesdropping is a computer fraud technique to"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/92621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=92621"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/92621\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=92621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=92621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=92621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}