{"id":197,"date":"2021-01-17T05:24:33","date_gmt":"2021-01-16T17:58:04","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/secure-software-lifecycle-professional-csslp-question189\/"},"modified":"2021-01-17T05:27:14","modified_gmt":"2021-01-17T05:27:14","slug":"secure-software-lifecycle-professional-csslp-question189","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/secure-software-lifecycle-professional-csslp-question189\/","title":{"rendered":"Secure Software Lifecycle Professional &#8211; CSSLP &#8211; Question189"},"content":{"rendered":"<div class=\"question\">Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information? <br \/><strong><br \/>A.<\/strong> Packet sniffing <br \/><strong>B.<\/strong> Keystroke logging <br \/><strong>C.<\/strong> Spoofing <br \/><strong>D.<\/strong> Wiretapping<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nExplanation: Keystroke logging is used by attackers to record everything a person types, including usernames, passwords, and account information. Keystroke logging is a method of logging and recording user keystrokes. It can be performed with software or hardware devices. Keystroke logging devices can record everything a person types using his keyboard, such as to measure employee&#8217;s productivity on certain clerical tasks. These types of devices can also be used to get usernames, passwords, etc. Answer: D is incorrect. Wiretapping is used to eavesdrop on voice calls. Eavesdropping is the process of listening in on private conversations. It also includes attackers listening in on network traffic. Answer: C is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else&#8217;s IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected. Answer: A is incorrect. Packet sniffing is a process of monitoring data packets that travel across a network. The software used for packet sniffing is known as sniffers. There are many packet-sniffing programs that are available on the Internet. Some of these are unauthorized, which can be harmful for a network&#8217;s security.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following is used by attackers to record everything a person types, including usernames, passwords, and account information? A. Packet sniffing B. Keystroke logging C. Spoofing D. Wiretapping Show Answer Hide Answer Correct Answer: B Explanation: Explanation: Keystroke logging is used by attackers to record everything a person types, including usernames, passwords, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[353,192,3],"class_list":["post-197","post","type-post","status-publish","format-standard","hentry","category-secure-software-lifecycle-professional-csslp","tag-choices","tag-question-189","tag-secure-software-lifecycle-professional-csslp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/posts\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":548,"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/posts\/197\/revisions\/548"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CSSLP\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}