nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #196

CERTIFIED-IN-CYBERSECURITY Question #196: Real Exam Question with Answer & Explanation

The correct answer is D: To gain access to a target system by using a false identity. The primary goal of a spoofing attack is to gain access to a target system by using a false identity (see ISC2 Study Guide, Chapter 4, Module 2). In spoofing attacks, an attacker pretends to be a trusted device or user on a network in order to launch attacks against network hosts

Access Controls Concepts

Question

What is the PRIMARY goal of a spoofing attack?

Options

  • AMisdirect users to malicious websites
  • BInsert a program into a system to alter data
  • CConsume network resources and prevent legitimate activity
  • DTo gain access to a target system by using a false identity

Explanation

The primary goal of a spoofing attack is to gain access to a target system by using a false identity (see ISC2 Study Guide, Chapter 4, Module 2). In spoofing attacks, an attacker pretends to be a trusted device or user on a network in order to launch attacks against network hosts, steal data, or bypass access controls. Spoofing attacks can take different forms, such as IP packet spoofing, email spoofing, or even caller ID spoofing. While spoofing can be used in conjunction with other attacks, none of the alternatives is the primary goal of a spoofing attack. In fact, misdirecting users to malicious Web sites, consuming network resources and preventing legitimate activity, or inserting a program into a system to alter data can be categorized as phishing, denial-of-service (DoS), and malware attacks, respectively.

Topics

#Spoofing attacks#Cyber threats#Identity compromise#Access control bypass

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions