ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 1458 - CISSP discussion

Report
Export

Which of the following attack types can be used to compromise the integrity of data during transmission?

A.
Keylogging
Answers
A.
Keylogging
B.
Packet sniffing
Answers
B.
Packet sniffing
C.
Synchronization flooding
Answers
C.
Synchronization flooding
D.
Session hijacking
Answers
D.
Session hijacking
Suggested answer: B
asked 18/09/2024
junjie wang
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first