An attacker tries to gain knowledge about the Telemetry implementation, including the authentication and encryption status. [1]
Standard/references: [2] [3] [4] [5]