easy
Single Answer
0You discover that a user on your network has been using the Wireshark tool, as shown here. Further investigation revealed that he was using it for illicit purposes. What pillar of information security has most likely been violated?
Answer Options
A
Integrity
B
Denial
C
Availability
D
Confidentiality
Correct Answer: D
Explanation
Wireshark is a protocol analyzer and may be used to eavesdrop on network connections. Eavesdropping is an attack against confidentiality.