exam questions

Exam ECSS All Questions

View all questions & answers for the ECSS exam

Exam ECSS topic 1 question 20 discussion

Actual exam question from ECCouncil's ECSS
Question #: 20
Topic #: 1
[All ECSS Questions]

Networks are vulnerable to an attack, which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.
Which of the following network attack refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

  • A. Session Sniffing
  • B. Port Scanning
  • C. IP Address Spoofing
  • D. Denial-of-Service Attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago