Monitoring electromagnetic pulse emanations from PCs and CRTs provides a hacker with that
significant advantage?
A.
Defeat the TEMPEST safeguard
B.
Bypass the system security application.
C.
Gain system information without trespassing
D.
Undetectable active monitoring.
Explanation:
Tempest equipment is implemented to prevent intruders from picking up information
through the airwaves with listening devices. – Shon Harris All-in-one CISSP Certification Guide pg
192. In Harris’s other book CISSP PASSPORT, she talks about tempest in terms of spy movies
and how a van outside is listening or monitoring to the activities of someone. This lends credence
to the answer of C (trespassing) but I think D is more correct. In that all the listener must do is
listen to the RF. Use your best judgment based on experience and knowledge.
check
Anything ‘active’ is normally considered to be changing the flow of data or information. Monitoring RFI from a monitor can only be passive and B looks to be more closer than other answers.