Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 7 Question 65 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 65
Topic #: 7
[All CPEH-001 Questions]

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Annabelle
2 months ago
I'm going with B) Man-in-the-middle. Eric's basically the third wheel in this scenario, except he's not bringing snacks, he's just stealing everyone's login credentials. Smooth move, Eric.
upvoted 0 times
Marsha
5 days ago
It's a classic attack where the attacker secretly intercepts and possibly alters the communication between two parties.
upvoted 0 times
...
Beckie
9 days ago
I agree, he's like a silent observer relaying information without anyone noticing.
upvoted 0 times
...
Marcos
1 months ago
Yeah, definitely B) Man-in-the-middle. Eric is sneaky intercepting those communications.
upvoted 0 times
...
...
Wilson
2 months ago
B) Man-in-the-middle is the way to go. Eric's using those Dsniff tools like a ninja, sneaking in between the two entities and intercepting their communications. It's like he's the middleman at a secret spy meeting.
upvoted 0 times
...
Javier
2 months ago
I'm going with B) Man-in-the-middle as well. I mean, it's like Eric is the bouncer at a party, checking everyone's credentials and then letting them in. Except, you know, without the party and with a lot more hacking involved.
upvoted 0 times
...
Tammara
2 months ago
Definitely B) Man-in-the-middle. Eric is essentially inserting himself into the communication channel and acting as a proxy between the two parties. This is textbook MITM.
upvoted 0 times
Trina
7 days ago
D) Poisoning Attack
upvoted 0 times
...
Bette
9 days ago
C) ARP Proxy
upvoted 0 times
...
Hillary
16 days ago
B) Man-in-the-middle
upvoted 0 times
...
Lorrie
1 months ago
A) Interceptor
upvoted 0 times
...
...
Brock
2 months ago
I think the correct answer is B) Man-in-the-middle. Eric is intercepting and relaying the communication between the two entities without their knowledge, which is a classic man-in-the-middle attack.
upvoted 0 times
Carmela
1 months ago
B) Man-in-the-middle
upvoted 0 times
...
Kenda
2 months ago
A) Interceptor
upvoted 0 times
...
...
Jody
2 months ago
I agree with Anisha, it's definitely B) Man-in-the-middle. Eric is in the middle of the communication, manipulating the data.
upvoted 0 times
...
Anisha
2 months ago
I think it's B) Man-in-the-middle because Eric is intercepting communications without the two entities knowing.
upvoted 0 times
...
Elza
2 months ago
B) Man-in-the-middle
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77