New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 2 Question 45 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 45
Topic #: 2
[All GCIH Questions]

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Contribute your Thoughts:

0/2000 characters
Solange
2 months ago
Not sure about that, seems like mail bombing is different.
upvoted 0 times
...
Mireya
2 months ago
Totally agree with the first three options!
upvoted 0 times
...
Linsey
2 months ago
I think dictionary attacks count too.
upvoted 0 times
...
Weldon
3 months ago
Definitely spoofing and brute force attacks!
upvoted 0 times
...
Artie
3 months ago
Wait, is mail bombing really an access control attack?
upvoted 0 times
...
Audra
3 months ago
I think all three—spoofing, brute force, and dictionary attacks—are related to access control, but I need to double-check my notes.
upvoted 0 times
...
Della
3 months ago
I feel like mail bombing is more about denial of service rather than access control, but I could be wrong.
upvoted 0 times
...
Susy
4 months ago
I remember practicing with a question that included brute force and dictionary attacks as examples of access control attacks.
upvoted 0 times
...
Gladis
4 months ago
I think spoofing is definitely an access control attack, but I'm not sure about the others.
upvoted 0 times
...
Steffanie
4 months ago
This question seems pretty straightforward. I'm going to read through the options and select the ones that clearly represent access control attacks.
upvoted 0 times
...
Amalia
4 months ago
I've studied this topic before, so I think I've got a good handle on the different types of attacks. I'll just carefully review each option and select the ones I'm sure about.
upvoted 0 times
...
Bettina
4 months ago
Okay, spoofing is definitely a type of access control attack, that's an easy one. But I'm a little fuzzy on some of the other options.
upvoted 0 times
...
Kendra
5 months ago
Hmm, I'm not totally sure about the difference between a brute force attack and a dictionary attack. I'll have to think that through carefully.
upvoted 0 times
...
Ardella
5 months ago
This looks like a pretty straightforward question on access control attacks. I'm confident I can identify the correct answers.
upvoted 0 times
...
Louann
5 months ago
I think A) Spoofing is an access control attack.
upvoted 0 times
...
Venita
5 months ago
Spoofing, brute force, and dictionary attacks? Yep, those are the classics. But mail bombing? That's like trying to steal a cookie by blowing up the whole bakery. Talk about escalation.
upvoted 0 times
Tamesha
1 month ago
Mail bombing? That's just overkill!
upvoted 0 times
...
Kenneth
2 months ago
Dictionary attacks can be sneaky.
upvoted 0 times
...
Bo
2 months ago
Brute force attacks are so common too.
upvoted 0 times
...
Jeanice
2 months ago
Spoofing is definitely a classic.
upvoted 0 times
...
...
Keva
6 months ago
Hmm, this is a tough one. I'd say A, B, and C are the clear winners here. D, on the other hand, is just a desperate cry for attention. Real hackers go for the subtle approach, you know?
upvoted 0 times
Malcolm
5 months ago
Yeah, D seems a bit too obvious and not as sophisticated as the others.
upvoted 0 times
...
Blondell
5 months ago
I agree, A, B, and C are definitely types of access control attacks.
upvoted 0 times
...
...
Cassie
6 months ago
A, B, and C are spot on. But D? Mail bombing? That's like using a bazooka to swat a fly. Overkill, if you ask me.
upvoted 0 times
...
Kimbery
7 months ago
All four options are legit access control attacks. I mean, who doesn't love a good mail bombing now and then? It really spices up the hacking game.
upvoted 0 times
...
Jerlene
7 months ago
Of course A, B, and C are correct! Spoofing, brute force, and dictionary attacks are classic access control attacks. But D? Mail bombing? That's just a distraction, not an access control issue.
upvoted 0 times
Malcolm
5 months ago
A, B, and C are correct! Spoofing, brute force, and dictionary attacks are classic access control attacks. But D? Mail bombing? That's just a distraction, not an access control issue.
upvoted 0 times
...
Stephaine
5 months ago
D) Mail bombing
upvoted 0 times
...
Anastacia
5 months ago
C) Dictionary attack
upvoted 0 times
...
Alex
5 months ago
B) Brute force attack
upvoted 0 times
...
Nada
6 months ago
A) Spoofing
upvoted 0 times
...
...

Save Cancel