Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer
- Ends In
00:00:00
Coupon code:
SAVE25
X
Welcome to Pass4Success
Login
|
Sign up
-
Free
Preparation Discussions
Mail Us
support@pass4success.com
Location
PL
MENU
Home
Popular vendors
Salesforce
Microsoft
Nutanix
Cisco
Amazon
Google
CompTIA
SAP
VMware
Oracle
Fortinet
PeopleCert
Eccouncil
HP
Palo Alto Networks
Adobe
ISC2
ServiceNow
Dell EMC
CheckPoint
Discount Deals
New
About
Contact
Login
Sign up
Home
Discussions
GIAC Discussions
Exam GCIH Topic 8 Question 25 Discussion
GIAC Exam GCIH Topic 8 Question 25 Discussion
Actual exam question for GIAC's GCIH exam
Question #: 25
Topic #: 8
[All GCIH Questions]
Which of the following statements about smurf is true?
A
It is a UDP attack that involves spoofing and flooding.
B
It is an ICMP attack that involves spoofing and flooding.
C
It is an attack with IP fragments that cannot be reassembled.
D
It is a denial of service (DoS) attack that leaves TCP ports open.
Show Suggested Answer
Hide Answer
Suggested Answer:
B
by
Kassandra
at
Aug 23, 2024, 06:25 AM
Limited Time Offer
25%
Off
Get Premium GCIH Questions as Interactive Web-Based Practice Test or PDF
Contribute your Thoughts:
Submit
Cancel
Leonora
9 months ago
I'm going with A. It's the only one that really captures the essence of the smurf attack.
upvoted
0
times
...
Malcom
9 months ago
Haha, who comes up with these answer choices? Smurf is definitely not a TCP attack.
upvoted
0
times
...
Leonie
9 months ago
D is just silly. Smurf has nothing to do with leaving TCP ports open.
upvoted
0
times
Galen
8 months ago
I agree, D is definitely not correct. It's between A and B.
upvoted
0
times
...
Roslyn
8 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted
0
times
...
Latosha
8 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted
0
times
...
Mickie
8 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted
0
times
...
Johna
8 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted
0
times
...
Julianna
9 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted
0
times
...
King
9 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted
0
times
...
...
Carolynn
9 months ago
I think D) It is a denial of service (DoS) attack that leaves TCP ports open is the right answer based on my understanding.
upvoted
0
times
...
Shawnta
10 months ago
I'm not sure, but I think C) It is an attack with IP fragments that cannot be reassembled makes sense.
upvoted
0
times
...
Tomoko
10 months ago
Hmm, I'm not sure. C sounds like it could be related to smurf, but I can't say for certain.
upvoted
0
times
Jaime
9 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted
0
times
...
Tiera
9 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted
0
times
...
...
Antonio
10 months ago
I disagree, I believe the correct answer is B) It is an ICMP attack that involves spoofing and flooding.
upvoted
0
times
...
Johnetta
10 months ago
B seems more accurate to me. Smurf uses ICMP, not UDP.
upvoted
0
times
Vashti
9 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted
0
times
...
Lilli
9 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted
0
times
...
Jules
9 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted
0
times
...
...
Beth
10 months ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted
0
times
Delmy
9 months ago
Cherrie: No, it's not. Smurf specifically targets UDP protocols.
upvoted
0
times
...
Lawrence
10 months ago
So, it's not an ICMP attack like option B?
upvoted
0
times
...
Cherrie
10 months ago
Yes, you are correct. Smurf is indeed a UDP attack that involves spoofing and flooding.
upvoted
0
times
...
Lorenza
10 months ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted
0
times
...
...
Shasta
10 months ago
I think the answer is A) It is a UDP attack that involves spoofing and flooding.
upvoted
0
times
...
Log in to Pass4Success
×
Sign in:
Forgot my password
Log in
Report Comment
×
Is the comment made by
USERNAME
spam or abusive?
Commenting
×
In order to participate in the comments you need to be logged-in.
You can
sign-up
or
login
Save
Cancel
az-700
pass4success
az-104
200-301
200-201
cissp
350-401
350-201
350-501
350-601
350-801
350-901
az-720
az-305
pl-300
Leonora
9 months agoMalcom
9 months agoLeonie
9 months agoGalen
8 months agoRoslyn
8 months agoLatosha
8 months agoMickie
8 months agoJohna
8 months agoJulianna
9 months agoKing
9 months agoCarolynn
9 months agoShawnta
10 months agoTomoko
10 months agoJaime
9 months agoTiera
9 months agoAntonio
10 months agoJohnetta
10 months agoVashti
9 months agoLilli
9 months agoJules
9 months agoBeth
10 months agoDelmy
9 months agoLawrence
10 months agoCherrie
10 months agoLorenza
10 months agoShasta
10 months ago