Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 2 Question 58 Discussion

Actual exam question for GIAC's GISP exam
Question #: 58
Topic #: 2
[All GISP Questions]

Which of the following refers to the emulation of the identity of a network computer by an attacking computer?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Lenna
2 days ago
Haha, 'Spoofing' for the win! I bet the person who wrote this question is a real network security geek. Not that there's anything wrong with that, of course.
upvoted 0 times
...
Dalene
4 days ago
Yeah, definitely 'Spoofing'. I remember learning about that in my networking class. It's a sneaky way for hackers to gain unauthorized access to systems.
upvoted 0 times
...
Elfriede
5 days ago
I'm not sure, but I think it could also be A) Hacking.
upvoted 0 times
...
Tanesha
10 days ago
I agree with Jesusa, spoofing makes sense in this context.
upvoted 0 times
...
Leonardo
10 days ago
Hmm, I'm pretty sure this is a case of 'Spoofing'. That's when an attacker tries to impersonate a legitimate network device, right?
upvoted 0 times
...
Jesusa
14 days ago
I think the answer is C) Spoofing.
upvoted 0 times
...

Save Cancel