ECCouncil Computer Hacking Forensic Investigator EC0-349 Question # 31 Topic 4 Discussion

ECCouncil Computer Hacking Forensic Investigator EC0-349 Question # 31 Topic 4 Discussion

EC0-349 Exam Topic 4 Question 31 Discussion:
Question #: 31
Topic #: 4

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into thecompany? firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the companycompany? phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company? PBX system be called?


A.

Phreaking


B.

Squatting


C.

Crunching


D.

Pretexting


Get Premium EC0-349 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.