ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 627 - CISSP discussion

Report
Export

Which of the following attacks is dependent upon the compromise of a secondary target in order to reach the primary target?

A.
Watering hole
Answers
A.
Watering hole
B.
Brute force
Answers
B.
Brute force
C.
Spear phishing
Answers
C.
Spear phishing
D.
Address Resolution Protocol (ARP) poisoning
Answers
D.
Address Resolution Protocol (ARP) poisoning
Suggested answer: D
asked 18/09/2024
Francesco D'Agostino
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first