Exam 312-49v10 All QuestionsBrowse all questions from this exam
Question 168

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?

    Correct Answer: A

    Phreaking is a type of attack where an attacker exploits a telephone system or PBX (Private Branch Exchange) to make unauthorized use of the system. In this scenario, the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files, which aligns with the characteristics of phreaking.

Discussion
aqeel1506Option: A

The correct answer is A. Phreaking. Phreaking is a type of attack where an attacker exploits a telephone system or PBX (Private Branch Exchange) to make unauthorized use of the system, often for malicious purposes. In this case, the intruders hacked into the company phone system and used the hard drives on the PBX system to store shared music files, which is a classic example of phreaking. Here's a brief overview of the other options: B. Squatting refers to the act of taking over an abandoned or unoccupied IP address or domain name. The correct answer is A. Phreaking. Phreaking is a type of attack where an attacker exploits a telephone system or PBX (Private Branch Exchange) to make unauthorized use of the system, often for malicious purposes. In this case, the intruders hacked into the company phone system and used the hard drives on the PBX system to store shared music files, which is a classic example of phreaking.

ElbOption: A

A < PBX is used for business telephone systems. Phreaking is a form of hacking that targets the telephone system.