CISM Certified Information Security Manager – Question0788

Spoofing should be prevented because it may be used to:

A.
assemble information, track traffic, and identify network vulnerabilities.
B. predict which way a program will branch when an option is presented.
C. gain illegal entry to a secure system by faking the sender’s address.
D. capture information such as password traveling through the network.

Correct Answer: C