Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 7 Question 65 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 65
Topic #: 7
[All CPEH-001 Questions]

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Elin
6 months ago
I thought Dsniff was just for sniffing packets, not relaying!
upvoted 0 times
...
Leonie
6 months ago
Poisoning Attack sounds a bit off for this scenario.
upvoted 0 times
...
Goldie
7 months ago
Wait, are we sure it's not ARP Proxy?
upvoted 0 times
...
Magnolia
7 months ago
Totally agree, it's classic MITM.
upvoted 0 times
...
Kate
7 months ago
That's definitely a Man-in-the-middle attack.
upvoted 0 times
...
German
7 months ago
I feel like I've seen something similar before, but I can't recall if it was specifically called a Poisoning Attack or something else.
upvoted 0 times
...
Rodrigo
7 months ago
This scenario definitely resembles a practice question we did on interception techniques. I think the answer is B, Man-in-the-middle.
upvoted 0 times
...
Rebbecca
7 months ago
I'm not entirely sure, but I think it could also be related to ARP Proxy. I need to double-check that.
upvoted 0 times
...
Isaiah
7 months ago
I remember studying about different types of attacks, and this sounds a lot like a Man-in-the-middle attack.
upvoted 0 times
...
Ethan
7 months ago
Okay, I've got a strategy for this. The key is to identify the enterprise role that is focused on aligning IT/technology decisions with the overall business strategy and keeping leadership informed. I think I know the right answer, but I'll double-check my reasoning.
upvoted 0 times
...
Florinda
7 months ago
I think the Application Insights Connector might be the way to go here. It's designed for monitoring and alerting on application issues, which sounds like what we need to trigger the ServiceNow ticket. But I'm not 100% certain, so I'll review the other options as well.
upvoted 0 times
...
Carla
7 months ago
I think it might be about reassurance messages? There was a similar question about providing information during a call.
upvoted 0 times
...
Dottie
8 months ago
Okay, I've got a strategy here. The question is asking about the storage management portal, so I need to focus on the management features rather than the underlying storage types. "All types of cloud storage devices" seems like the most comprehensive answer.
upvoted 0 times
...
Annabelle
1 year ago
I'm going with B) Man-in-the-middle. Eric's basically the third wheel in this scenario, except he's not bringing snacks, he's just stealing everyone's login credentials. Smooth move, Eric.
upvoted 0 times
Marsha
11 months ago
It's a classic attack where the attacker secretly intercepts and possibly alters the communication between two parties.
upvoted 0 times
...
Beckie
11 months ago
I agree, he's like a silent observer relaying information without anyone noticing.
upvoted 0 times
...
Marcos
1 year ago
Yeah, definitely B) Man-in-the-middle. Eric is sneaky intercepting those communications.
upvoted 0 times
...
...
Wilson
1 year ago
B) Man-in-the-middle is the way to go. Eric's using those Dsniff tools like a ninja, sneaking in between the two entities and intercepting their communications. It's like he's the middleman at a secret spy meeting.
upvoted 0 times
...
Javier
1 year ago
I'm going with B) Man-in-the-middle as well. I mean, it's like Eric is the bouncer at a party, checking everyone's credentials and then letting them in. Except, you know, without the party and with a lot more hacking involved.
upvoted 0 times
...
Tammara
1 year ago
Definitely B) Man-in-the-middle. Eric is essentially inserting himself into the communication channel and acting as a proxy between the two parties. This is textbook MITM.
upvoted 0 times
Felix
11 months ago
D) Poisoning Attack
upvoted 0 times
...
Katheryn
11 months ago
C) ARP Proxy
upvoted 0 times
...
Gerardo
11 months ago
B) Man-in-the-middle
upvoted 0 times
...
Annamaria
11 months ago
A) Interceptor
upvoted 0 times
...
Trina
11 months ago
D) Poisoning Attack
upvoted 0 times
...
Bette
11 months ago
C) ARP Proxy
upvoted 0 times
...
Hillary
11 months ago
B) Man-in-the-middle
upvoted 0 times
...
Lorrie
1 year ago
A) Interceptor
upvoted 0 times
...
...
Brock
1 year ago
I think the correct answer is B) Man-in-the-middle. Eric is intercepting and relaying the communication between the two entities without their knowledge, which is a classic man-in-the-middle attack.
upvoted 0 times
Carmela
1 year ago
B) Man-in-the-middle
upvoted 0 times
...
Kenda
1 year ago
A) Interceptor
upvoted 0 times
...
...
Jody
1 year ago
I agree with Anisha, it's definitely B) Man-in-the-middle. Eric is in the middle of the communication, manipulating the data.
upvoted 0 times
...
Anisha
1 year ago
I think it's B) Man-in-the-middle because Eric is intercepting communications without the two entities knowing.
upvoted 0 times
...
Elza
1 year ago
B) Man-in-the-middle
upvoted 0 times
...

Save Cancel