Which among the following is an active attack?
(1)Accessing restricted data
(2)User Impersonation
(3)Eavesdropping on network traffic
(4)Release of message content