Page 946 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 946
14. What is it called when email itself is used as an attack mechanism?
A. Masquerading
B. Mail-bombing
C. Spoofing
D. Smurf attack
15. Why is spam so difficult to stop?
A. Filters are ineffective at blocking inbound messages.
B. The source address is usually spoofed.
C. It is an attack requiring little expertise.
D. Spam can cause denial-of-service attacks.
16. Which of the following is a type of connection that can be described
as a logical circuit that always exists and is waiting for the
customer to send data?
A. ISDN
B. PVC
C. VPN
D. SVC
17. In addition to maintaining an updated system and controlling
physical access, which of the following is the most effective
countermeasure against PBX fraud and abuse?
A. Encrypting communications
B. Changing default passwords
C. Using transmission logs
D. Taping and archiving all conversations
18. Which of the following can be used to bypass even the best physical
and logical security mechanisms to gain access to a system?
A. Dictionary attacks
B. Denial of service

