Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Ruby's attack involved collecting discarded sensitive documents. What type of attack was this?

  1. Close in Attack

  2. Man-in-the-Middle Attack

  3. Phishing Attack

  4. Brute Force Attack

The correct answer is: Close in Attack

The scenario presented involves collecting discarded sensitive documents, which falls under the category of a Close in Attack. This type of attack refers to the physical gathering of data through direct access to discarded materials, such as documents, hard drives, or other physical forms of sensitive information. In this context, the attacker is leveraging their proximity to access confidential information without needing to rely on technical exploits or deception through digital means. The act of collecting discarded documents highlights the importance of proper disposal methods for sensitive information, as physical security is a crucial aspect of overall cybersecurity. Other types of attacks mentioned do not fit this situation. A Man-in-the-Middle Attack typically involves intercepting communications between two parties without their knowledge; a Phishing Attack seeks to deceive individuals into providing sensitive information through fraudulent means; and a Brute Force Attack relies on systematically guessing passwords to gain unauthorized access to accounts or systems. Each of these tactics relies on different methods rather than the physical collection of discarded data that Ruby employed.