New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSS Exam - Topic 2 Question 49 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 49
Topic #: 2
[All ECSS Questions]

In which of the following techniques does an attacker take network traffic coming towards a host at one port and forward it from that host to another host?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Shawna
4 months ago
Agreed, C is the right answer!
upvoted 0 times
...
James
4 months ago
Really? I didn't think port redirection was a thing.
upvoted 0 times
...
Ashanti
4 months ago
No way, it's C for sure!
upvoted 0 times
...
Luisa
4 months ago
I thought it was A, firewalking?
upvoted 0 times
...
Juliann
5 months ago
It's definitely C, port redirection.
upvoted 0 times
...
France
5 months ago
Snooping seems more related to intercepting data rather than forwarding it, but I could be wrong.
upvoted 0 times
...
Samira
5 months ago
I remember practicing a question similar to this, and I think firewalking was about probing firewalls, not forwarding traffic.
upvoted 0 times
...
Arlette
5 months ago
I think port redirection sounds familiar, but I'm not entirely sure if that's the right answer.
upvoted 0 times
...
Glynda
5 months ago
I'm leaning towards port redirection, but I feel like I need to double-check the definitions of each technique.
upvoted 0 times
...
Jody
5 months ago
This question seems straightforward - I just need to identify the option that would give Terry a false sense of assurance about Laura's checks. I'll carefully review each answer choice.
upvoted 0 times
...
Jospeh
5 months ago
Option C doesn't sound right to me. If Selenium can navigate web pages, it should be able to capture screenshots of modal message boxes as well, even if it requires some additional handling.
upvoted 0 times
...
Mariann
5 months ago
This seems like a tricky question. I'll need to really understand the AICPA/CICA Privacy Maturity Model to answer this properly.
upvoted 0 times
...
Veda
5 months ago
I'm not entirely sure, but I remember something about HTTP possibly working too. Just confused between TCP and UDP.
upvoted 0 times
...

Save Cancel