List of questions
Related questions
Question 395 - CISM discussion
Spoofing should be prevented because it may be used to:
A.
gain illegal entry to a secure system by faking the sender's address,
B.
predict which way a program will branch when an option is presented
C.
assemble information, track traffic, and identify network vulnerabilities.
D.
capture information such as passwords traveling through the network
Your answer:
0 comments
Sorted by
Leave a comment first