Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam CSSLP Topic 7 Question 85 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 85
Topic #: 7
[All CSSLP Questions]

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Show Suggested Answer Hide Answer
Suggested Answer: A, C, D

The security challenges for DRM are as follows:

Key hiding: It prevents tampering attacks that target the secret keys. In the key hiding process, secret keys are used for

authentication, encryption, and node-locking.

Device fingerprinting: It prevents fraud and provides secure authentication. Device fingerprinting includes the summary of hardware

and software characteristics in order to uniquely identify a device.

OTA provisioning: It provides end-to-end encryption or other secure ways for delivery of copyrighted software to mobile devices.

Answer B is incorrect. Access control is not a security challenge for DRM.


Contribute your Thoughts:

Arminda
21 hours ago
Man, these cybersecurity questions can be tricky. But C sounds like the right choice - gotta keep an eye out for those pesky middle-men!
upvoted 0 times
...
Katy
3 days ago
Haha, I'm definitely not going to try a dictionary attack or password guessing. That's just asking to get caught. C is the way to go here.
upvoted 0 times
...
Lorrie
12 days ago
Hmm, I was initially leaning towards A, but C makes more sense. Gotta watch out for those sneaky man-in-the-middle attacks!
upvoted 0 times
...
Hobert
14 days ago
I think the answer is C. A man-in-the-middle attack sounds like the perfect description for an intermediary program between two hosts.
upvoted 0 times
...
Tamar
15 days ago
I'm not sure, but I think it's C) Man-in-the-middle attack too. It makes sense based on the description.
upvoted 0 times
...
Ming
19 days ago
I agree with Maryanne, because in a man-in-the-middle attack, the attacker intercepts communication between two parties.
upvoted 0 times
...
Maryanne
21 days ago
I think the answer is C) Man-in-the-middle attack.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77