Page 946 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 946

14.  What is it called when email itself is used as an attack mechanism?

                    A.  Masquerading


                    B.  Mail-bombing
                    C.  Spoofing


                    D.  Smurf attack

               15.  Why is spam so difficult to stop?

                    A.  Filters are ineffective at blocking inbound messages.

                    B.  The source address is usually spoofed.

                    C.  It is an attack requiring little expertise.

                    D.  Spam can cause denial-of-service attacks.

               16.  Which of the following is a type of connection that can be described
                    as a logical circuit that always exists and is waiting for the
                    customer to send data?


                    A.  ISDN

                    B.  PVC

                    C.  VPN

                    D.  SVC

               17.  In addition to maintaining an updated system and controlling
                    physical access, which of the following is the most effective
                    countermeasure against PBX fraud and abuse?

                    A.  Encrypting communications

                    B.  Changing default passwords


                    C.  Using transmission logs

                    D.  Taping and archiving all conversations

              18.  Which of the following can be used to bypass even the best physical
                    and logical security mechanisms to gain access to a system?

                    A.  Dictionary attacks

                    B.  Denial of service
   941   942   943   944   945   946   947   948   949   950   951