Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 1 Question 82 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 82
Topic #: 1
[All ISSMP Questions]

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Show Suggested Answer Hide Answer
Suggested Answer: C

Eavesdropping is the process of listening in private conversations. It also includes attackers listening in on the network traffic. For example, it can be done over telephone lines (wiretapping), e-mail, instant messaging, and any other method of communication considered private.

Answer option B is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected.

Answer option A is incorrect. Shielding cannot be done over e-mail and instant messaging. Shielding is a way of preventing electronic emissions that are generated from a computer or network from being used by unauthorized users for gathering confidential information. It minimizes the chances of eavesdropping within a network. Shielding can be provided by surrounding a computer room with a Farady cage. A Farady cage is a device that prevents electromagnetic signal emissions from going outside the computer room. Shielding can also protect wireless networks from denial of service (DoS) attacks.

Answer option D is incorrect. Packaging is a process in which goods are differentiated on the basis of the container in which they are stored, such as bottles, boxes, bags, etc.


Contribute your Thoughts:

Mary
6 months ago
I feel like B) Spoofing could also be a possible answer, since it involves deceiving or tricking someone.
upvoted 0 times
...
Rossana
6 months ago
I agree with because eavesdropping involves listening in on private communication.
upvoted 0 times
...
Marylin
7 months ago
I think the answer is C) Eavesdropping.
upvoted 0 times
...
Andree
7 months ago
I see your point Latosha, but I think eavesdropping is a more direct violation of privacy.
upvoted 0 times
...
Latosha
7 months ago
But what about B) Spoofing? That also involves deception over communication channels.
upvoted 0 times
...
France
7 months ago
I agree with Tonette, because eavesdropping involves listening in on private communication.
upvoted 0 times
...
Tonette
7 months ago
I think the answer is C) Eavesdropping.
upvoted 0 times
Fredric
6 months ago
I don't think so, spoofing is more about impersonating someone or something.
upvoted 0 times
...
Fredric
7 months ago
But what about spoofing? Could that also be a method used?
upvoted 0 times
...
Fredric
7 months ago
I agree, eavesdropping is the correct answer.
upvoted 0 times
...
...
Tu
8 months ago
Hmm, I don't know. What about shielding? Couldn't that also be done over these communication methods to protect against eavesdropping or spoofing?
upvoted 0 times
...
Victor
8 months ago
I'm leaning more towards eavesdropping. Spoofing seems like it would require a bit more effort and technical know-how. Eavesdropping is just passively intercepting the communication.
upvoted 0 times
...
Lizette
8 months ago
Good point, Yolande. Spoofing could definitely be a valid answer as well. It's a tricky one, but I think both eavesdropping and spoofing fit the criteria.
upvoted 0 times
...
Yolande
8 months ago
I'm not so sure. What about spoofing? Couldn't that also be done over these communication methods by impersonating someone else?
upvoted 0 times
...
Vallie
8 months ago
I agree with Allene. Eavesdropping is the obvious choice here. It's the only one that involves intercepting private communications without the knowledge of the parties involved.
upvoted 0 times
...
Allene
8 months ago
Hmm, this question seems a bit tricky. I think the answer is C) Eavesdropping. That's the only option that seems to fit the description of being able to be done over various communication methods without physical access.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77