who is asking for her private account information. This attackcould be characterized as all of the following except:

Kevin changes his e-mail header so that Kim thinks his message is coming from anIT administrator who is asking for her private account information. This attackcould be characterized as all of the following except:

Kevin changes his e-mail header so that Kim thinks his message is coming from anIT administrator who is asking for her private account information. This attackcould be characterized as all of the following except:

A.
Spoofing

B.
Passive

C.
Masquerading

D.
Social engineering

Explanation:
Kevin’s actions are all of the listed types of attacks except passive. This was anactive attack because he was actually doing and manipulating something. Examples ofpassive attacks are eavesdropping or wiretapping versus actively changing the headerof a message.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

Correct answer is B