Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam SSCP All Questions

View all questions & answers for the SSCP exam

Exam SSCP topic 1 question 148 discussion

Actual exam question from ISC's SSCP
Question #: 148
Topic #: 1
[All SSCP Questions]

What refers to legitimate users accessing networked services that would normally be restricted to them?

  • A. Spoofing
  • B. Piggybacking
  • C. Eavesdropping
  • D. Logon abuse D
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
outnumber_gargle024
8 months, 3 weeks ago
piggybacking is a physical security threat, not a network-level threat. you can't piggyback access into the network using someone else's privileges. you can physically enter a secure building by piggybacking and plug into the LAN that way, sure, but that isn't this scenario.
upvoted 1 times
outnumber_gargle024
8 months, 3 weeks ago
answer is D - logon abuse
upvoted 1 times
...
...
swiggharo
10 months, 3 weeks ago
Selected Answer: D
I'm going to have to go with 'D'. Piggybacking is usually when someone physically enters a facility without authorization by following someone with authorization. Although 'B' could work in this scenario, it is not the best option.
upvoted 3 times
...
nanson
1 year ago
Selected Answer: B
The term that refers to legitimate users accessing networked services that would normally be restricted to them is: B. Piggybacking Piggybacking occurs when an unauthorized user gains access to a secure location or system by following closely behind an authorized person. In the context of network security, it refers to someone accessing services or systems by using the credentials of an authorized user, allowing them to gain entry that would typically be restricted.
upvoted 1 times
...
Rixster
1 year, 2 months ago
Selected Answer: B
Piggybacking refers to the situation where legitimate users access networked services that would normally be restricted to them by using the credentials of another authorized user. This can happen when an unauthorized individual follows an authorized person into a secure area or uses their login credentials to gain unauthorized access. The other options: A. Spoofing involves pretending to be someone or something else to gain unauthorized access. C. Eavesdropping involves intercepting and listening to communications without authorization. D. Logon abuse refers to unauthorized use or manipulation of logon credentials to gain access to a system.
upvoted 2 times
...
floaterr
1 year, 5 months ago
Anwer is "D"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...