New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 3 Question 90 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 90
Topic #: 3
[All ISSMP Questions]

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Leslie
3 months ago
Totally agree, eavesdropping is a big issue nowadays!
upvoted 0 times
...
Sherita
3 months ago
Wait, can you really eavesdrop over email? Sounds sketchy.
upvoted 0 times
...
Cassandra
3 months ago
Shielding is the best way to protect your info!
upvoted 0 times
...
Delila
4 months ago
I think spoofing is more common than people realize.
upvoted 0 times
...
Taryn
4 months ago
Eavesdropping can totally happen over those methods.
upvoted 0 times
...
Catalina
4 months ago
Packaging seems off for this question; I feel like it relates more to data transfer rather than communication itself.
upvoted 0 times
...
Emelda
4 months ago
I practiced a question similar to this, and I think spoofing might not fit since it's more about impersonation than communication methods.
upvoted 0 times
...
Lakeesha
4 months ago
Eavesdropping sounds familiar, but I can't recall if it's specifically linked to private communication channels.
upvoted 0 times
...
Laurena
5 months ago
I think I remember that shielding is about protecting data, but I'm not sure if it applies to communication methods like these.
upvoted 0 times
...
Jerry
5 months ago
Spoofing, for sure. That's the kind of thing you can do over private communication channels to try to trick people.
upvoted 0 times
...
Sharen
5 months ago
I'm a bit confused. Packaging? I don't see how that would apply to all those communication methods. I'll have to re-read the question.
upvoted 0 times
...
Gabriele
5 months ago
This seems like a tricky question. I'll need to think carefully about the different communication methods and what kind of activities can be done over them.
upvoted 0 times
...
Karrie
5 months ago
Eavesdropping, that's got to be the answer. You can definitely do that over all those communication channels.
upvoted 0 times
...
Willow
5 months ago
This is a good question to test our understanding of scan log files. I think option C is the most comprehensive answer, as it covers the results of the various scan types. I'll go with that one.
upvoted 0 times
...
Nu
2 years ago
Eavesdropping, hands down. The best way to keep tabs on your coworkers.
upvoted 0 times
Margart
2 years ago
I agree, it's the perfect way to stay in the loop.
upvoted 0 times
...
Fairy
2 years ago
Eavesdropping is definitely the way to go.
upvoted 0 times
...
...
Candida
2 years ago
Eavesdropping, definitely. I bet I could hear some juicy office gossip with that one.
upvoted 0 times
...
Laurel
2 years ago
I'm going with Spoofing. It's the only option that really screams 'hacker movie' to me.
upvoted 0 times
Cherri
1 year ago
I think so too, it's the most exciting choice.
upvoted 0 times
...
Luisa
1 year ago
Definitely, it's the most 'movie hacker' option on the list.
upvoted 0 times
...
An
1 year ago
I agree, Spoofing sounds like something a hacker would do.
upvoted 0 times
...
Lawrence
2 years ago
D) Packaging
upvoted 0 times
...
Elbert
2 years ago
C) Eavesdropping
upvoted 0 times
...
Caprice
2 years ago
B) Spoofing
upvoted 0 times
...
Hubert
2 years ago
A) Shielding
upvoted 0 times
...
...
Daniel
2 years ago
I believe Shielding is more about protecting from external interference, while Eavesdropping is about listening in on private communication.
upvoted 0 times
...
Tabetha
2 years ago
I'm not sure, but I think Shielding could also be a possible answer to protect privacy.
upvoted 0 times
...
Dallas
2 years ago
Eavesdropping, of course! Who doesn't love a good spy thriller?
upvoted 0 times
Ashton
2 years ago
D) Packaging
upvoted 0 times
...
Gilma
2 years ago
C) Eavesdropping
upvoted 0 times
...
Yolande
2 years ago
B) Spoofing
upvoted 0 times
...
Julieta
2 years ago
A) Shielding
upvoted 0 times
...
...
Gracia
2 years ago
I agree with Lourdes, because eavesdropping can be done over various communication methods.
upvoted 0 times
...
Lourdes
2 years ago
I think the answer is C) Eavesdropping.
upvoted 0 times
...

Save Cancel