New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 5 Question 36 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 36
Topic #: 5
[All CPEH-001 Questions]

You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?

Show Suggested Answer Hide Answer
Suggested Answer: B

Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker's host to a destination host through a packet-filtering device. This technique can be used to map 'open' or 'pass through' ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.


Contribute your Thoughts:

0/2000 characters
Santos
4 months ago
Really? I always thought it was just called footprinting.
upvoted 0 times
...
Roselle
4 months ago
Firewalking for sure, but it's tricky!
upvoted 0 times
...
Lorrine
4 months ago
Wait, isn't idle scanning a different technique?
upvoted 0 times
...
Vivan
4 months ago
I thought it was enumeration, but firewalking makes sense.
upvoted 0 times
...
Beata
5 months ago
That's definitely firewalking!
upvoted 0 times
...
Cassi
5 months ago
I practiced a similar question where we discussed the differences between idle scanning and firewalking, but I can't recall the specifics right now.
upvoted 0 times
...
Cathrine
5 months ago
I'm not entirely sure, but I remember something about enumeration being more about gathering information from a system rather than testing firewall rules.
upvoted 0 times
...
Ona
5 months ago
I think this might be related to firewalking since it involves sending packets to map out the firewall policy.
upvoted 0 times
...
Evette
5 months ago
Firewalking sounds familiar, but I also feel like it could be considered a form of footprinting. I wish I had reviewed that section more thoroughly.
upvoted 0 times
...
Simona
5 months ago
I've got a strategy in mind. I think the key is to configure the dial peers to use both G.711 A-law and iLBC, so we can negotiate with the different destinations. Let me double-check the options.
upvoted 0 times
...
Rocco
5 months ago
Hmm, I'm a bit unsure about this one. The question is asking for a consultant's recommendation, so I'm not sure if adding a stage or a custom field is the best approach. I might need to think through the pros and cons of each option a bit more.
upvoted 0 times
...
Ciara
5 months ago
Hmm, this seems like a tricky one. I'll need to think it through carefully.
upvoted 0 times
...
Katina
5 months ago
Ah, I remember learning about this in my IBM Netezza training. I believe the answer is A, IBM Spectrum Scale or GPFS.
upvoted 0 times
...
Lenna
5 months ago
I'm not totally sure about this, but I think it might have something to do with related INC records. Let me re-read the question.
upvoted 0 times
...
Amie
5 months ago
This seems like a tricky one. I'll need to carefully review the details about the deployment scripts and the changes made by the two administrators.
upvoted 0 times
...

Save Cancel