Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of attack did Don perform when he used a keylogger to capture Bob's bank credentials?

  1. Passive Attack

  2. Social Engineering Attack

  3. Active Online Attack

  4. Physical Attack

The correct answer is: Active Online Attack

The type of attack that Don performed when he used a keylogger to capture Bob's bank credentials is classified as an active online attack. In this context, an active attack involves the attacker actively engaging with a system or network to intercept and manipulate data in real time. By using a keylogger, which records the keystrokes of Bob, Don is directly compromising the security of Bob’s account and stealing sensitive information as it is entered. Active online attacks require the attacker to have a level of access or control over the system or network they are attacking, which is clearly demonstrated by the use of a keylogger to capture bank credentials during the login process. This contrasts with passive attacks, which involve eavesdropping or monitoring without interfering with the data being transmitted. In Bob's case, Don is not merely observing; instead, he is retrieving information actively as Bob types it in, which solidifies the classification of this action as an active online attack.