Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 6 Question 82 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 82
Topic #: 6
[All CPEH-001 Questions]

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

Show Suggested Answer Hide Answer
Suggested Answer: C

System Key hotfix is an optional feature which allows stronger encryption of SAM. Strong encryption protects private account information by encrypting the password data using a 128-bit cryptographically random key, known as a password encryption key.


Contribute your Thoughts:

0/2000 characters
Kyoko
5 months ago
Yeah, Smurf Attack is correct!
upvoted 0 times
...
Florinda
6 months ago
Wait, are we sure about that? Sounds off.
upvoted 0 times
...
Miss
6 months ago
Smurf Attack is the right term here.
upvoted 0 times
...
Timothy
6 months ago
I thought it was a Fraggle Attack?
upvoted 0 times
...
Sherita
6 months ago
Definitely a Smurf Attack!
upvoted 0 times
...
Sherly
7 months ago
I thought the Smurf Attack was the right term for this, especially since it involves a primary and secondary victim.
upvoted 0 times
...
Rebecka
7 months ago
I keep mixing up Smurf Attack and Fraggle Attack. I know one of them involves spoofing, but I can't recall which is which.
upvoted 0 times
...
Louvenia
7 months ago
I practiced a question similar to this, and I feel like Fraggle Attack was mentioned, but it seems different from what we're looking for here.
upvoted 0 times
...
Arlyne
7 months ago
I think the answer might be Smurf Attack, but I'm not entirely sure. I remember it involves ICMP packets.
upvoted 0 times
...
Ula
7 months ago
I've seen this type of attack before. The Smurf Attack is the correct answer here. Just need to remember the details about the ICMP echo request and primary/secondary victims.
upvoted 0 times
...
Lynsey
7 months ago
I'm a little confused by the wording of this question. I'll need to re-read it a few times to make sure I understand what they're asking.
upvoted 0 times
...
Quentin
7 months ago
Okay, let me break this down. The key details are that it's a broadcast ICMP echo request with a primary and secondary victim. That sounds like a Smurf Attack to me.
upvoted 0 times
...
Izetta
7 months ago
This one seems pretty straightforward. I'm pretty sure the answer is D - Smurf Attack.
upvoted 0 times
...
Tamra
7 months ago
Hmm, I'm not totally sure about this one. I'll have to think it through carefully before answering.
upvoted 0 times
...
Stefanie
7 months ago
Hmm, I'm a bit confused here. The question mentions Alibaba Cloud, but I'm not too familiar with their security offerings. I'll need to review the options carefully to understand which one would be best for mitigating brute force attacks.
upvoted 0 times
...
Candida
8 months ago
I think I know how to approach this. The key is to focus on the specific activities mentioned in the statement - identifying opportunities, determining needs, and evaluating the competition. If those accurately describe post-sale, then the statement is true.
upvoted 0 times
...
Leah
12 months ago
This question is a real Smurfing headache, but I'm pretty sure the answer is D) Smurf Attack. Time to get my blue hat and start pummeling those primary and secondary victims!
upvoted 0 times
Aracelis
10 months ago
It's a classic example of a network layer attack.
upvoted 0 times
...
Junita
10 months ago
The primary victim receives all the replies, causing a denial of service.
upvoted 0 times
...
Matthew
10 months ago
Yeah, a Smurf Attack is when the attacker sends a large amount of ICMP echo request packets to the broadcast address.
upvoted 0 times
...
Delsie
11 months ago
I think you're right, it's definitely a Smurf Attack.
upvoted 0 times
...
...
Catherin
1 year ago
Wait, is this a trick question? I'm going to go with E) Back Orifice Attack, just to keep the examiner on their toes.
upvoted 0 times
Makeda
11 months ago
Actually, it's D) Smurf Attack. Good try though!
upvoted 0 times
...
Jennifer
11 months ago
No, I believe it's A) Fraggle Attack.
upvoted 0 times
...
Tiera
11 months ago
I think it's D) Smurf Attack.
upvoted 0 times
...
...
Jaclyn
1 year ago
Haha, I bet the person who wrote this question is a Smurf fan! D) Smurf Attack all the way, no doubt about it.
upvoted 0 times
Andra
11 months ago
I think D) Smurf Attack is the most fitting term for that scenario.
upvoted 0 times
...
Norah
11 months ago
Yeah, definitely D) Smurf Attack, it's a classic example of a broadcast attack.
upvoted 0 times
...
Ernie
12 months ago
I agree, D) Smurf Attack is the correct term for that type of attack.
upvoted 0 times
...
...
Therese
1 year ago
Hmm, I'm not too sure about this one. I'm leaning towards B) Man in the Middle Attack, but I could be wrong. Guess I need to study up on my network security terminologies.
upvoted 0 times
Dorian
11 months ago
I agree with you, I think it's B) Man in the Middle Attack.
upvoted 0 times
...
Kimi
11 months ago
I'm pretty sure it's E) Back Orifice Attack.
upvoted 0 times
...
Jeannetta
11 months ago
I believe it's A) Fraggle Attack.
upvoted 0 times
...
Leonard
1 year ago
I think it's D) Smurf Attack.
upvoted 0 times
...
...
Carey
1 year ago
Clearly, the answer is D) Smurf Attack. I've read all about these types of attacks and how they work. This is a classic example.
upvoted 0 times
Jerlene
1 year ago
Yes, a Smurf Attack involves sending a large amount of ICMP echo request packets to the broadcast address of a network.
upvoted 0 times
...
Barrett
1 year ago
I agree, D) Smurf Attack is the correct answer.
upvoted 0 times
...
...
Curt
1 year ago
I'm not sure, but I think it might be A) Fraggle Attack instead.
upvoted 0 times
...
Felicia
1 year ago
I agree with Ben, a Smurf Attack makes sense in this context.
upvoted 0 times
...
Ben
1 year ago
I think the answer is D) Smurf Attack.
upvoted 0 times
...

Save Cancel