New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 6 Question 82 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 82
Topic #: 6
[All CPEH-001 Questions]

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

Show Suggested Answer Hide Answer
Suggested Answer: C

System Key hotfix is an optional feature which allows stronger encryption of SAM. Strong encryption protects private account information by encrypting the password data using a 128-bit cryptographically random key, known as a password encryption key.


Contribute your Thoughts:

0/2000 characters
Kyoko
3 months ago
Yeah, Smurf Attack is correct!
upvoted 0 times
...
Florinda
3 months ago
Wait, are we sure about that? Sounds off.
upvoted 0 times
...
Miss
3 months ago
Smurf Attack is the right term here.
upvoted 0 times
...
Timothy
4 months ago
I thought it was a Fraggle Attack?
upvoted 0 times
...
Sherita
4 months ago
Definitely a Smurf Attack!
upvoted 0 times
...
Sherly
4 months ago
I thought the Smurf Attack was the right term for this, especially since it involves a primary and secondary victim.
upvoted 0 times
...
Rebecka
4 months ago
I keep mixing up Smurf Attack and Fraggle Attack. I know one of them involves spoofing, but I can't recall which is which.
upvoted 0 times
...
Louvenia
4 months ago
I practiced a question similar to this, and I feel like Fraggle Attack was mentioned, but it seems different from what we're looking for here.
upvoted 0 times
...
Arlyne
5 months ago
I think the answer might be Smurf Attack, but I'm not entirely sure. I remember it involves ICMP packets.
upvoted 0 times
...
Ula
5 months ago
I've seen this type of attack before. The Smurf Attack is the correct answer here. Just need to remember the details about the ICMP echo request and primary/secondary victims.
upvoted 0 times
...
Lynsey
5 months ago
I'm a little confused by the wording of this question. I'll need to re-read it a few times to make sure I understand what they're asking.
upvoted 0 times
...
Quentin
5 months ago
Okay, let me break this down. The key details are that it's a broadcast ICMP echo request with a primary and secondary victim. That sounds like a Smurf Attack to me.
upvoted 0 times
...
Izetta
5 months ago
This one seems pretty straightforward. I'm pretty sure the answer is D - Smurf Attack.
upvoted 0 times
...
Tamra
5 months ago
Hmm, I'm not totally sure about this one. I'll have to think it through carefully before answering.
upvoted 0 times
...
Stefanie
5 months ago
Hmm, I'm a bit confused here. The question mentions Alibaba Cloud, but I'm not too familiar with their security offerings. I'll need to review the options carefully to understand which one would be best for mitigating brute force attacks.
upvoted 0 times
...
Candida
5 months ago
I think I know how to approach this. The key is to focus on the specific activities mentioned in the statement - identifying opportunities, determining needs, and evaluating the competition. If those accurately describe post-sale, then the statement is true.
upvoted 0 times
...
Leah
9 months ago
This question is a real Smurfing headache, but I'm pretty sure the answer is D) Smurf Attack. Time to get my blue hat and start pummeling those primary and secondary victims!
upvoted 0 times
Aracelis
7 months ago
It's a classic example of a network layer attack.
upvoted 0 times
...
Junita
8 months ago
The primary victim receives all the replies, causing a denial of service.
upvoted 0 times
...
Matthew
8 months ago
Yeah, a Smurf Attack is when the attacker sends a large amount of ICMP echo request packets to the broadcast address.
upvoted 0 times
...
Delsie
8 months ago
I think you're right, it's definitely a Smurf Attack.
upvoted 0 times
...
...
Catherin
10 months ago
Wait, is this a trick question? I'm going to go with E) Back Orifice Attack, just to keep the examiner on their toes.
upvoted 0 times
Makeda
8 months ago
Actually, it's D) Smurf Attack. Good try though!
upvoted 0 times
...
Jennifer
8 months ago
No, I believe it's A) Fraggle Attack.
upvoted 0 times
...
Tiera
8 months ago
I think it's D) Smurf Attack.
upvoted 0 times
...
...
Jaclyn
10 months ago
Haha, I bet the person who wrote this question is a Smurf fan! D) Smurf Attack all the way, no doubt about it.
upvoted 0 times
Andra
8 months ago
I think D) Smurf Attack is the most fitting term for that scenario.
upvoted 0 times
...
Norah
8 months ago
Yeah, definitely D) Smurf Attack, it's a classic example of a broadcast attack.
upvoted 0 times
...
Ernie
9 months ago
I agree, D) Smurf Attack is the correct term for that type of attack.
upvoted 0 times
...
...
Therese
10 months ago
Hmm, I'm not too sure about this one. I'm leaning towards B) Man in the Middle Attack, but I could be wrong. Guess I need to study up on my network security terminologies.
upvoted 0 times
Dorian
8 months ago
I agree with you, I think it's B) Man in the Middle Attack.
upvoted 0 times
...
Kimi
8 months ago
I'm pretty sure it's E) Back Orifice Attack.
upvoted 0 times
...
Jeannetta
9 months ago
I believe it's A) Fraggle Attack.
upvoted 0 times
...
Leonard
9 months ago
I think it's D) Smurf Attack.
upvoted 0 times
...
...
Carey
10 months ago
Clearly, the answer is D) Smurf Attack. I've read all about these types of attacks and how they work. This is a classic example.
upvoted 0 times
Jerlene
10 months ago
Yes, a Smurf Attack involves sending a large amount of ICMP echo request packets to the broadcast address of a network.
upvoted 0 times
...
Barrett
10 months ago
I agree, D) Smurf Attack is the correct answer.
upvoted 0 times
...
...
Curt
11 months ago
I'm not sure, but I think it might be A) Fraggle Attack instead.
upvoted 0 times
...
Felicia
11 months ago
I agree with Ben, a Smurf Attack makes sense in this context.
upvoted 0 times
...
Ben
11 months ago
I think the answer is D) Smurf Attack.
upvoted 0 times
...

Save Cancel