Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?
A) Phreaking
B) Squatting
C) Crunching
D) Pretexting
Correct Answer:
Verified
Q17: In the following directory listing, 
Q18: When needing to search for a website
Q19: What is the smallest physical storage unit
Q20: After attending a CEH security seminar, you
Q21: You are a security analyst performing reconnaissance
Q23: When is it appropriate to use computer
Q24: What is the first step taken in
Q25: What encryption technology is used on Blackberry
Q26: Why is it a good idea to
Q27: In the following email header, where did
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents