CERTIFIED-IN-CYBERSECURITY · Question #150
CERTIFIED-IN-CYBERSECURITY Question #150: Real Exam Question with Answer & Explanation
The correct answer is C: Spoofing. Spoofing is an attack whose primary goal is to gain access to a target system through a falsified identity. In a spoofing attack, the attacker creates or manipulates a digital identity or communication, so as to deceive the target into believing that the attacker is someone or so
Question
Which of these is an attack whose PRIMARY goal is to gain access to a target system through falsified identity?
Options
- AAmplification
- BDDoS
- CSpoofing
- DRansomware
Explanation
Spoofing is an attack whose primary goal is to gain access to a target system through a falsified identity. In a spoofing attack, the attacker creates or manipulates a digital identity or communication, so as to deceive the target into believing that the attacker is someone or something else. There are many different types of spoofing attacks, including email spoofing, IP spoofing, and URL spoofing. Such attacks are used to gain unauthorized access to systems or networks, steal sensitive information, or spread malware (see ISC2 Study Guide, chapter 4, module 2). The other types of attacks listed above have different primary goals. DDoS (Distributed Denial of Service) attacks aim at overwhelming a target system with traffic to disrupt its operation; amplification attacks involve using a third-party system to amplify the strength of an attack; and ransomware attacks typically encrypt a target system's data, and then demand a ransom in exchange for the decryption code.
Topics
Community Discussion
No community discussion yet for this question.