Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 1 Question 82 Discussion

Actual exam question for ISC2's Information Systems Security Management Professional exam
Question #: 82
Topic #: 1
[All Information Systems Security Management Professional Questions]

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Show Suggested Answer Hide Answer
Suggested Answer: C

Eavesdropping is the process of listening in private conversations. It also includes attackers listening in on the network traffic. For example, it can be done over telephone lines (wiretapping), e-mail, instant messaging, and any other method of communication considered private.

Answer option B is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected.

Answer option A is incorrect. Shielding cannot be done over e-mail and instant messaging. Shielding is a way of preventing electronic emissions that are generated from a computer or network from being used by unauthorized users for gathering confidential information. It minimizes the chances of eavesdropping within a network. Shielding can be provided by surrounding a computer room with a Farady cage. A Farady cage is a device that prevents electromagnetic signal emissions from going outside the computer room. Shielding can also protect wireless networks from denial of service (DoS) attacks.

Answer option D is incorrect. Packaging is a process in which goods are differentiated on the basis of the container in which they are stored, such as bottles, boxes, bags, etc.


Contribute your Thoughts:

Tu
7 days ago
Hmm, I don't know. What about shielding? Couldn't that also be done over these communication methods to protect against eavesdropping or spoofing?
upvoted 0 times
...
Victor
9 days ago
I'm leaning more towards eavesdropping. Spoofing seems like it would require a bit more effort and technical know-how. Eavesdropping is just passively intercepting the communication.
upvoted 0 times
...
Lizette
10 days ago
Good point, Yolande. Spoofing could definitely be a valid answer as well. It's a tricky one, but I think both eavesdropping and spoofing fit the criteria.
upvoted 0 times
...
Yolande
11 days ago
I'm not so sure. What about spoofing? Couldn't that also be done over these communication methods by impersonating someone else?
upvoted 0 times
...
Vallie
13 days ago
I agree with Allene. Eavesdropping is the obvious choice here. It's the only one that involves intercepting private communications without the knowledge of the parties involved.
upvoted 0 times
...
Allene
14 days ago
Hmm, this question seems a bit tricky. I think the answer is C) Eavesdropping. That's the only option that seems to fit the description of being able to be done over various communication methods without physical access.
upvoted 0 times
...

Save Cancel