nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #150

CERTIFIED-IN-CYBERSECURITY Question #150: Real Exam Question with Answer & Explanation

The correct answer is C: Spoofing. Spoofing is an attack whose primary goal is to gain access to a target system through a falsified identity. In a spoofing attack, the attacker creates or manipulates a digital identity or communication, so as to deceive the target into believing that the attacker is someone or so

Security Principles

Question

Which of these is an attack whose PRIMARY goal is to gain access to a target system through falsified identity?

Options

  • AAmplification
  • BDDoS
  • CSpoofing
  • DRansomware

Explanation

Spoofing is an attack whose primary goal is to gain access to a target system through a falsified identity. In a spoofing attack, the attacker creates or manipulates a digital identity or communication, so as to deceive the target into believing that the attacker is someone or something else. There are many different types of spoofing attacks, including email spoofing, IP spoofing, and URL spoofing. Such attacks are used to gain unauthorized access to systems or networks, steal sensitive information, or spread malware (see ISC2 Study Guide, chapter 4, module 2). The other types of attacks listed above have different primary goals. DDoS (Distributed Denial of Service) attacks aim at overwhelming a target system with traffic to disrupt its operation; amplification attacks involve using a third-party system to amplify the strength of an attack; and ransomware attacks typically encrypt a target system's data, and then demand a ransom in exchange for the decryption code.

Topics

#Spoofing#Identity Falsification#Access Attacks#Cyber Attack Types

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions