✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
| Column A | Column B |
|---|---|
| A. Eavesdropping | 1. Active attack |
| B. DoS attack | 2. Passive attack |
| C. Malware | 3. Unauthorized software attack |
| D. Intrusion | 4. Unauthorized access |