New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSS Exam - Topic 2 Question 5 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 5
Topic #: 2
[All ECSS Questions]

Which of the following techniques is used to log network traffic?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Oretha
4 months ago
Wait, can sniffing really capture all traffic? Sounds too easy.
upvoted 0 times
...
Terrilyn
4 months ago
Totally agree, sniffing is the go-to for logging traffic!
upvoted 0 times
...
Lashaun
4 months ago
Cracking is more about breaking into systems, not logging.
upvoted 0 times
...
Meghan
4 months ago
I thought tunneling was used for that too?
upvoted 0 times
...
Pura
5 months ago
Sniffing is definitely the right answer.
upvoted 0 times
...
Felice
5 months ago
I practiced a similar question where sniffing was definitely mentioned as a technique for monitoring network traffic.
upvoted 0 times
...
Malinda
5 months ago
I'm not entirely sure, but I remember something about tunneling being related to secure connections, not logging traffic.
upvoted 0 times
...
Zita
5 months ago
I think sniffing is the right answer since it involves capturing packets on a network.
upvoted 0 times
...
Ashton
5 months ago
Cracking and IP address spoofing don't seem to fit the context of logging, but I'm a bit confused about tunneling.
upvoted 0 times
...
Ilene
5 months ago
Ah, this is a tricky one. I can see the logic behind options A and C, but I'm not totally convinced. I might have to eliminate a couple of the options and then make my best guess.
upvoted 0 times
...
Eulah
5 months ago
I've got a good strategy for this - I'll make a quick list of the sections and required columns, then match that up to the answer choices to find the right one.
upvoted 0 times
...
Marcos
5 months ago
Replacing the variable declaration from a List to a single Account seems like a strange solution. I don't think that's the right approach here.
upvoted 0 times
...

Save Cancel