Which of the following is an example of a passive attack method?
A.
Keystroke logging
B.
Piggybacking
C.
Eavesdropping
D.
Phishing
The Answer Is:
C
This question includes an explanation.
Explanation:
Comprehensive and Detailed in-Depth Explanation:
A passive attack involves monitoring or listening without altering data or system operations. Eavesdropping is a classic example, where attackers intercept data without affecting the transmission.
Keystroke logging (Option A) and phishing (Option D) are active attacks. Piggybacking (Option B) involves unauthorized access and is also active.
ISACA CISA Reference: Domain 5 - Protection of Information Assets
CISA PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"