New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 2 Question 30 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 30
Topic #: 2
[All GCIH Questions]

Which of the following steps can be taken as countermeasures against sniffer attacks?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D

Contribute your Thoughts:

0/2000 characters
Cory
3 months ago
I agree with A and B, but D feels like overkill.
upvoted 0 times
...
Paul
3 months ago
C sounds good, but are those tools really effective?
upvoted 0 times
...
Dorothea
3 months ago
B is spot on! Switches are way better than hubs.
upvoted 0 times
...
Ettie
4 months ago
Not sure about D, seems a bit extreme.
upvoted 0 times
...
Laquanda
4 months ago
A is definitely a must! Encrypt everything.
upvoted 0 times
...
Kathrine
4 months ago
StackGuard and Immunix System sound familiar, but I’m not confident they directly relate to sniffer attacks.
upvoted 0 times
...
Tarra
4 months ago
I feel like reducing the range of the network could help, but I can't recall if it's a complete solution against sniffers.
upvoted 0 times
...
Cordelia
4 months ago
I remember practicing a question similar to this, and I think using switches instead of hubs was one of the correct answers.
upvoted 0 times
...
Lenny
5 months ago
I think using encrypted protocols is definitely a good countermeasure, but I'm not sure about the others.
upvoted 0 times
...
Wayne
5 months ago
This is a good opportunity to demonstrate my knowledge of network security best practices. I'll make sure to select all the relevant countermeasures.
upvoted 0 times
...
German
5 months ago
I'm a little confused by the last option about reducing the range of wireless networks. Does that really help against sniffer attacks on wired networks? I'll need to double-check that one.
upvoted 0 times
...
Staci
5 months ago
Okay, let's see. Using encrypted protocols, switches instead of hubs, and tools like StackGuard seem like good options to protect against sniffers. I'll make sure to select those.
upvoted 0 times
...
Huey
5 months ago
Hmm, I'm a bit unsure about the specifics of sniffer attacks and countermeasures. I'll need to think this through carefully.
upvoted 0 times
...
Ranee
5 months ago
This looks like a pretty straightforward question about network security. I'm confident I can handle this one.
upvoted 0 times
...
Goldie
5 months ago
This is a good networking question. I remember learning about default routes and how routers handle situations where they can't find the next hop. I think the answer is to forward the packet to the default route, but I'll double-check my understanding just to be sure.
upvoted 0 times
...
Norah
1 year ago
Haha, C is like the weird uncle of the answer options. Let's just stick to the proven methods, shall we?
upvoted 0 times
Sabine
1 year ago
D) Reduce the range of the network to avoid attacks into wireless networks.
upvoted 0 times
...
Lakeesha
1 year ago
B) Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
upvoted 0 times
...
Lorean
1 year ago
D) Reduce the range of the network to avoid attacks into wireless networks.
upvoted 0 times
...
Celestina
1 year ago
B) Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
upvoted 0 times
...
Kris
1 year ago
A) Use encrypted protocols for all communications.
upvoted 0 times
...
Stephaine
1 year ago
A) Use encrypted protocols for all communications.
upvoted 0 times
...
...
Pamella
1 year ago
C? Really? StackGuard and Immunix? I think I'd rather just stick to the classic A and B. Why complicate things?
upvoted 0 times
Reiko
1 year ago
C) Use tools such as StackGuard and Immunix System to avoid attacks.
upvoted 0 times
...
Shalon
1 year ago
B) Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
upvoted 0 times
...
Robt
1 year ago
A) Use encrypted protocols for all communications.
upvoted 0 times
...
...
Claribel
1 year ago
I agree with Michael, but D is also a good option. Reducing the wireless range can help prevent sniffer attacks. Gotta cover all the bases, you know?
upvoted 0 times
...
Earnestine
1 year ago
I also think reducing the range of the network can be effective in preventing attacks.
upvoted 0 times
...
Michael
1 year ago
A and B are definitely the way to go. Encrypted protocols and switches are the bread and butter of network security.
upvoted 0 times
Quentin
1 year ago
B) Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
upvoted 0 times
...
Lino
1 year ago
A) Use encrypted protocols for all communications.
upvoted 0 times
...
Ettie
1 year ago
B) Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
upvoted 0 times
...
Irma
1 year ago
A) Use encrypted protocols for all communications.
upvoted 0 times
...
...
Veda
1 year ago
I agree with Marg, encrypted protocols can help protect against sniffers.
upvoted 0 times
...
Marg
1 year ago
I think using encrypted protocols is a good countermeasure.
upvoted 0 times
...

Save Cancel