ISC Exam Questions

who is asking for her private account information. This attackcould be characterized as all of the f

Kevin changes his e-mail header so that Kim thinks his message is coming from anIT administrator who is asking for her private account information. This attackcould be characterized as all of the following except:

A.
Spoofing

B.
Passive

C.
Masquerading

D.
Social engineering

Explanation:
Kevin’s actions are all of the listed types of attacks except passive. This was anactive attack because he was actually doing and manipulating something. Examples ofpassive attacks are eavesdropping or wiretapping versus actively changing the headerof a message.