New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 7 Question 65 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 65
Topic #: 7
[All CPEH-001 Questions]

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Elin
4 months ago
I thought Dsniff was just for sniffing packets, not relaying!
upvoted 0 times
...
Leonie
4 months ago
Poisoning Attack sounds a bit off for this scenario.
upvoted 0 times
...
Goldie
4 months ago
Wait, are we sure it's not ARP Proxy?
upvoted 0 times
...
Magnolia
4 months ago
Totally agree, it's classic MITM.
upvoted 0 times
...
Kate
4 months ago
That's definitely a Man-in-the-middle attack.
upvoted 0 times
...
German
5 months ago
I feel like I've seen something similar before, but I can't recall if it was specifically called a Poisoning Attack or something else.
upvoted 0 times
...
Rodrigo
5 months ago
This scenario definitely resembles a practice question we did on interception techniques. I think the answer is B, Man-in-the-middle.
upvoted 0 times
...
Rebbecca
5 months ago
I'm not entirely sure, but I think it could also be related to ARP Proxy. I need to double-check that.
upvoted 0 times
...
Isaiah
5 months ago
I remember studying about different types of attacks, and this sounds a lot like a Man-in-the-middle attack.
upvoted 0 times
...
Ethan
5 months ago
Okay, I've got a strategy for this. The key is to identify the enterprise role that is focused on aligning IT/technology decisions with the overall business strategy and keeping leadership informed. I think I know the right answer, but I'll double-check my reasoning.
upvoted 0 times
...
Florinda
5 months ago
I think the Application Insights Connector might be the way to go here. It's designed for monitoring and alerting on application issues, which sounds like what we need to trigger the ServiceNow ticket. But I'm not 100% certain, so I'll review the other options as well.
upvoted 0 times
...
Carla
5 months ago
I think it might be about reassurance messages? There was a similar question about providing information during a call.
upvoted 0 times
...
Dottie
5 months ago
Okay, I've got a strategy here. The question is asking about the storage management portal, so I need to focus on the management features rather than the underlying storage types. "All types of cloud storage devices" seems like the most comprehensive answer.
upvoted 0 times
...
Annabelle
10 months ago
I'm going with B) Man-in-the-middle. Eric's basically the third wheel in this scenario, except he's not bringing snacks, he's just stealing everyone's login credentials. Smooth move, Eric.
upvoted 0 times
Marsha
9 months ago
It's a classic attack where the attacker secretly intercepts and possibly alters the communication between two parties.
upvoted 0 times
...
Beckie
9 months ago
I agree, he's like a silent observer relaying information without anyone noticing.
upvoted 0 times
...
Marcos
9 months ago
Yeah, definitely B) Man-in-the-middle. Eric is sneaky intercepting those communications.
upvoted 0 times
...
...
Wilson
10 months ago
B) Man-in-the-middle is the way to go. Eric's using those Dsniff tools like a ninja, sneaking in between the two entities and intercepting their communications. It's like he's the middleman at a secret spy meeting.
upvoted 0 times
...
Javier
10 months ago
I'm going with B) Man-in-the-middle as well. I mean, it's like Eric is the bouncer at a party, checking everyone's credentials and then letting them in. Except, you know, without the party and with a lot more hacking involved.
upvoted 0 times
...
Tammara
10 months ago
Definitely B) Man-in-the-middle. Eric is essentially inserting himself into the communication channel and acting as a proxy between the two parties. This is textbook MITM.
upvoted 0 times
Felix
8 months ago
D) Poisoning Attack
upvoted 0 times
...
Katheryn
8 months ago
C) ARP Proxy
upvoted 0 times
...
Gerardo
8 months ago
B) Man-in-the-middle
upvoted 0 times
...
Annamaria
8 months ago
A) Interceptor
upvoted 0 times
...
Trina
9 months ago
D) Poisoning Attack
upvoted 0 times
...
Bette
9 months ago
C) ARP Proxy
upvoted 0 times
...
Hillary
9 months ago
B) Man-in-the-middle
upvoted 0 times
...
Lorrie
10 months ago
A) Interceptor
upvoted 0 times
...
...
Brock
10 months ago
I think the correct answer is B) Man-in-the-middle. Eric is intercepting and relaying the communication between the two entities without their knowledge, which is a classic man-in-the-middle attack.
upvoted 0 times
Carmela
10 months ago
B) Man-in-the-middle
upvoted 0 times
...
Kenda
10 months ago
A) Interceptor
upvoted 0 times
...
...
Jody
11 months ago
I agree with Anisha, it's definitely B) Man-in-the-middle. Eric is in the middle of the communication, manipulating the data.
upvoted 0 times
...
Anisha
11 months ago
I think it's B) Man-in-the-middle because Eric is intercepting communications without the two entities knowing.
upvoted 0 times
...
Elza
11 months ago
B) Man-in-the-middle
upvoted 0 times
...

Save Cancel