Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 6 Question 82 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 82
Topic #: 6
[All CPEH-001 Questions]

What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

Show Suggested Answer Hide Answer
Suggested Answer: C

System Key hotfix is an optional feature which allows stronger encryption of SAM. Strong encryption protects private account information by encrypting the password data using a 128-bit cryptographically random key, known as a password encryption key.


Contribute your Thoughts:

Leah
2 months ago
This question is a real Smurfing headache, but I'm pretty sure the answer is D) Smurf Attack. Time to get my blue hat and start pummeling those primary and secondary victims!
upvoted 0 times
Aracelis
8 days ago
It's a classic example of a network layer attack.
upvoted 0 times
...
Junita
9 days ago
The primary victim receives all the replies, causing a denial of service.
upvoted 0 times
...
Matthew
10 days ago
Yeah, a Smurf Attack is when the attacker sends a large amount of ICMP echo request packets to the broadcast address.
upvoted 0 times
...
Delsie
26 days ago
I think you're right, it's definitely a Smurf Attack.
upvoted 0 times
...
...
Catherin
2 months ago
Wait, is this a trick question? I'm going to go with E) Back Orifice Attack, just to keep the examiner on their toes.
upvoted 0 times
Makeda
24 days ago
Actually, it's D) Smurf Attack. Good try though!
upvoted 0 times
...
Jennifer
26 days ago
No, I believe it's A) Fraggle Attack.
upvoted 0 times
...
Tiera
28 days ago
I think it's D) Smurf Attack.
upvoted 0 times
...
...
Jaclyn
2 months ago
Haha, I bet the person who wrote this question is a Smurf fan! D) Smurf Attack all the way, no doubt about it.
upvoted 0 times
Andra
1 months ago
I think D) Smurf Attack is the most fitting term for that scenario.
upvoted 0 times
...
Norah
1 months ago
Yeah, definitely D) Smurf Attack, it's a classic example of a broadcast attack.
upvoted 0 times
...
Ernie
2 months ago
I agree, D) Smurf Attack is the correct term for that type of attack.
upvoted 0 times
...
...
Therese
3 months ago
Hmm, I'm not too sure about this one. I'm leaning towards B) Man in the Middle Attack, but I could be wrong. Guess I need to study up on my network security terminologies.
upvoted 0 times
Dorian
1 months ago
I agree with you, I think it's B) Man in the Middle Attack.
upvoted 0 times
...
Kimi
1 months ago
I'm pretty sure it's E) Back Orifice Attack.
upvoted 0 times
...
Jeannetta
1 months ago
I believe it's A) Fraggle Attack.
upvoted 0 times
...
Leonard
2 months ago
I think it's D) Smurf Attack.
upvoted 0 times
...
...
Carey
3 months ago
Clearly, the answer is D) Smurf Attack. I've read all about these types of attacks and how they work. This is a classic example.
upvoted 0 times
Jerlene
3 months ago
Yes, a Smurf Attack involves sending a large amount of ICMP echo request packets to the broadcast address of a network.
upvoted 0 times
...
Barrett
3 months ago
I agree, D) Smurf Attack is the correct answer.
upvoted 0 times
...
...
Curt
3 months ago
I'm not sure, but I think it might be A) Fraggle Attack instead.
upvoted 0 times
...
Felicia
4 months ago
I agree with Ben, a Smurf Attack makes sense in this context.
upvoted 0 times
...
Ben
4 months ago
I think the answer is D) Smurf Attack.
upvoted 0 times
...

Save Cancel