ExamGecko
Question list
Search
Search

Question 271 - CISM discussion

Report
Export

Reverse lookups can be used to prevent successful:

A.
denial of service (DoS) attacks
Answers
A.
denial of service (DoS) attacks
B.
session hacking
Answers
B.
session hacking
C.
phishing attacks
Answers
C.
phishing attacks
D.
Internet protocol (IP) spoofing
Answers
D.
Internet protocol (IP) spoofing
Suggested answer: D

Explanation:

Reverse lookups can be used to prevent successful IP spoofing. IP spoofing is a type of attack in which an attacker sends packets with a false source IP address in order to disguise their identity or impersonate another system. By performing reverse lookups on the source IP address of incoming packets, the system can verify that the packets are coming from a trusted source, and any packets with an invalid or spoofed source IP can be discarded. This is an important measure for preventing IP spoofing, and can help to reduce the risk of other types of attacks, such as DoS attacks, session hacking, and phishing attacks.

asked 01/10/2024
Rohit Kumar
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first