CISSP · Question #45
CISSP Question #45: Real Exam Question with Answer & Explanation
The correct answer is D: Spoofing. The term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source is spoofing. Spoofing is a type of attack that involves impersonating or masquerading as a legitimate entity, such as a user, a device, or a network, b
Question
What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?
Options
- AMan-in-the-Middle (MITM) attack
- BSmurfing
- CSession redirect
- DSpoofing
Explanation
The term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source is spoofing. Spoofing is a type of attack that involves impersonating or masquerading as a legitimate entity, such as a user, a device, or a network, by altering or falsifying the source or destination address of a packet. Spoofing can be used to bypass authentication, gain unauthorized access, or launch other attacks, such as denial-of- service or man-in-the-middle. Man-in-the-middle, smurfing, and session redirect are not terms that refer to a technique of authenticating one machine to another by forging packets from a trusted source, as they are related to different types of attacks or techniques. Man-in-the-middle is an attack that involves intercepting and modifying the communication between two parties. Smurfing is an attack that involves sending a large number of ICMP echo requests to a network broadcast address, using a spoofed source address of the intended victim. Session redirect is a technique that involves changing the destination address of a packet to redirect it to a different
Topics
Community Discussion
No community discussion yet for this question.