New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 5 Question 12 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 12
Topic #: 5
[All CPEH-001 Questions]

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John's network, which of the following options is he likely to choose?

Show Suggested Answer Hide Answer
Suggested Answer: D

As long as you allow http or https traffic attacks can be tunneled over those protocols with Stunnel or HTTPTunnel.


Contribute your Thoughts:

0/2000 characters
Chaya
4 months ago
ClosedVPN? That sounds too complicated for an attacker.
upvoted 0 times
...
Gail
4 months ago
Wait, how did Jack even connect with those restrictions?
upvoted 0 times
...
Gussie
4 months ago
I don't think FTP would work well in this case.
upvoted 0 times
...
Merissa
4 months ago
D seems like the best option here.
upvoted 0 times
...
Sheldon
5 months ago
Port 80 is usually open for HTTP traffic.
upvoted 0 times
...
Latanya
5 months ago
I practiced a similar question where tunneling was the answer, so I’m leaning towards HTTPTunnel or Stunnel as the most likely choice for an attacker in this scenario.
upvoted 0 times
...
Diane
5 months ago
I think ClosedVPN could be a possibility, but I don't recall if it would work with the restrictions John has in place.
upvoted 0 times
...
Long
5 months ago
I'm not entirely sure, but I feel like a reverse shell using FTP might not be the best option here, especially since FTP usually requires specific ports to be open.
upvoted 0 times
...
Kasandra
5 months ago
I remember studying about tunneling techniques, and I think using HTTPTunnel or Stunnel could be a way to bypass the firewall since they work over port 80 and 443.
upvoted 0 times
...
Kina
5 months ago
I'm a little confused by this question. Updating the risk register doesn't seem directly relevant to the communication problem. I'm leaning towards either reviewing the stakeholder list or the engagement plan, but I'm not 100% sure.
upvoted 0 times
...
Arlie
5 months ago
I'm a bit unsure about this one. There are a few different authentication methods listed, and I'll need to make sure I understand the differences between them to choose the right solution.
upvoted 0 times
...
Shaniqua
5 months ago
I think option A is incorrect because we usually don't use asterisks with DELETE statements.
upvoted 0 times
...

Save Cancel