PrepAway - Latest Free Exam Questions & Answers

which one of the following attacks?

A system using Discretionary Access Control (DAC) is vulnerable to which one of the following
attacks?

PrepAway - Latest Free Exam Questions & Answers

A.
Trojan horse

B.
Phreaking

C.
Spoofing

D.
SYN flood

Explanation:
An attempt to gain access to a system by posing as an authorized user.
Synonymous with impersonating, masquerading, or mimicking. -Ronald Krutz The CISSP PREP
Guide (gold edition) pg 921
“Spoofing – The act of replacing the valid source and/or destination IP address and node numbers
with false ones.
Spoofing attack – any attack that involves spoofed or modified packets.” – Ed Tittle CISSP Study
Guide (sybex)

2 Comments on “which one of the following attacks?


Leave a Reply