A system using Discretionary Access Control (DAC) is vulnerable to which one of the following
attacks?

A.
Trojan horse
B.
Phreaking
C.
Spoofing
D.
SYN flood
Explanation:
An attempt to gain access to a system by posing as an authorized user.
Synonymous with impersonating, masquerading, or mimicking. -Ronald Krutz The CISSP PREP
Guide (gold edition) pg 921
“Spoofing – The act of replacing the valid source and/or destination IP address and node numbers
with false ones.
Spoofing attack – any attack that involves spoofed or modified packets.” – Ed Tittle CISSP Study
Guide (sybex)
oops
0
0
MAC also is vulnerable to Spoofing. MAC or DAC has little bearing on protection from Spoofing attacks.
0
0