Ethical Hacking Essentials Practice Test 2025 – The Complete Guide to Exam Success!

Question: 1 / 640

What type of attack did Don perform when he used a keylogger to capture Bob's bank credentials?

Passive Attack

Social Engineering Attack

Active Online Attack

The type of attack that Don performed when he used a keylogger to capture Bob's bank credentials is classified as an active online attack. In this context, an active attack involves the attacker actively engaging with a system or network to intercept and manipulate data in real time. By using a keylogger, which records the keystrokes of Bob, Don is directly compromising the security of Bob’s account and stealing sensitive information as it is entered.

Active online attacks require the attacker to have a level of access or control over the system or network they are attacking, which is clearly demonstrated by the use of a keylogger to capture bank credentials during the login process. This contrasts with passive attacks, which involve eavesdropping or monitoring without interfering with the data being transmitted. In Bob's case, Don is not merely observing; instead, he is retrieving information actively as Bob types it in, which solidifies the classification of this action as an active online attack.

Get further explanation with Examzify DeepDiveBeta

Physical Attack

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy