ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 275 - 312-49v10 discussion

Report
Export

Cylie is investigating a network breach at a state organization in Florid a. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?

A.
Phreaking
Answers
A.
Phreaking
B.
Squatting
Answers
B.
Squatting
C.
Crunching
Answers
C.
Crunching
D.
Pretexting
Answers
D.
Pretexting
Suggested answer: A
asked 18/09/2024
Martin Schouten
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first