Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 2 Question 102 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 102
Topic #: 2
[All CPEH-001 Questions]

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts. Which of the following features makes this possible? (Choose two)

Show Suggested Answer Hide Answer
Suggested Answer: A

Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system.


Contribute your Thoughts:

Art
2 days ago
Ah, the joys of legacy protocols. SNMP is like a trusty old car - it gets the job done, but you better keep an eye on the oil and hope the engine doesn't explode. Kudos to the hackers who can make the most of this ancient technology.
upvoted 0 times
...
Marvel
3 days ago
I can't believe they're still using SNMP with clear text community strings! That's like leaving your front door wide open and inviting the neighbors in for tea. Hackers must be having a field day with this protocol.
upvoted 0 times
...
Geoffrey
9 days ago
B and C are the correct answers. SNMP community strings are transmitted in clear text, making it easy for hackers to intercept and use that information to gain unauthorized access. And SNMP traffic is susceptible to sniffing, allowing hackers to gather a wealth of information about the target hosts.
upvoted 0 times
...
Billy
12 days ago
I also think A) could be a factor. Using TCP as the underlying protocol might make it easier for hackers to intercept data.
upvoted 0 times
...
Pansy
14 days ago
I agree with Kallie. The clear text transmission of community string and susceptibility to sniffing are major vulnerabilities.
upvoted 0 times
...
Kallie
16 days ago
I think B) and C) make it possible for hackers to gather information.
upvoted 0 times
...

Save Cancel