Drag the network attack technique on the left to the appropriate description or example on the right. (each techinique may be used once, more than once, or not at all.)
Perpetrators attempt to compromise or affect the operations of a system.
Unauthorized individuals try to breach a network from off-site
Attempting to find the root password on a web server by brute force.
Attempting to gather information without affecting the flow of information on the network.
Sniffing network packets or performing a port scan.