nerdexam
(ISC)2(ISC)2

CISSP · Question #118

CISSP Question #118: Real Exam Question with Answer & Explanation

The correct answer is C: Man-in-the-middle. The type of attack that has most likely occurred when a disgruntled network administrator has intercepted emails meant for the Chief Executive Officer (CEO) and changed them before forwarding them to their intended recipient is a man-in-the-middle (MITM) attack. A MITM attack is

Submitted by rania.sa· Mar 5, 2026Security Operations

Question

A thorough review of an organization's audit logs finds that a disgruntled network administrator has intercepted emails meant for the Chief Executive Officer (CEO) and changed them before forwarding them to their intended recipient. What type of attack has MOST likely occurred?

Options

  • ASpoofing
  • BEavesdropping
  • CMan-in-the-middle
  • DDenial of service

Explanation

The type of attack that has most likely occurred when a disgruntled network administrator has intercepted emails meant for the Chief Executive Officer (CEO) and changed them before forwarding them to their intended recipient is a man-in-the-middle (MITM) attack. A MITM attack is a type of attack that involves an attacker intercepting, modifying, or redirecting the communication between two parties, without their knowledge or consent. The attacker can alter, delete, or inject data, or impersonate one of the parties, to achieve malicious goals, such as stealing information, compromising security, or disrupting service. A MITM attack can be performed on various types of networks or protocols, such as email, web, or wireless. Spoofing, eavesdropping, and denial of service are not the types of attack that have most likely occurred in this scenario, as they do not involve the modification or manipulation of the communication between the parties, but rather the falsification, observation, or prevention of the communication.

Topics

#man-in-the-middle#MITM#email security#network attacks

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions