What would this attack on the company PBX system be called?

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were
able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers
through her investigation that the intruders hacked into the company phone system and used the hard drives
on their PBX system to store shared music files. What would this attack on the company PBX system be
called?

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were
able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers
through her investigation that the intruders hacked into the company phone system and used the hard drives
on their PBX system to store shared music files. What would this attack on the company PBX system be
called?

A.
Phreaking

B.
Squatting

C.
Crunching

D.
Pretexting



Leave a Reply 0

Your email address will not be published. Required fields are marked *