Passive attacks - Eavesdropping

Does the attacker need to continuously monitor the system to gather the data for eavesdropping?
Explanation

Explanation

Explanation

Explanation

Which of the following is an example of an eavesdropping attack?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Traffic analysis is an example for
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation