New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 2 Question 50 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 50
Topic #: 2
[All GCIH Questions]

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using GIACing2 utility. This attack is known as __________.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Ty
3 days ago
D) Spoofing, gotta love a bit of that!
upvoted 0 times
...
Veronica
8 days ago
Ah, the good old port scanning trick. Classic!
upvoted 0 times
...
Yaeko
13 days ago
C) Firewalking, that's the one!
upvoted 0 times
...
Tiffiny
18 days ago
Firewalking seems like it could fit, but I feel like that's more about probing firewalls rather than just scanning ports.
upvoted 0 times
...
Cherilyn
24 days ago
Cloaking sounds familiar, but I don't recall it being used in this context. I might be mixing it up with something else.
upvoted 0 times
...
Kristel
29 days ago
I remember practicing something similar with GIACing2, and I think it was about identifying open ports, so it might be A.
upvoted 0 times
...
Gerald
1 month ago
I think this is related to port scanning, but I'm not entirely sure if the specific technique is called something else.
upvoted 0 times
...
Noble
1 month ago
I'm not totally sure about this one, but I'll give it my best shot. I'll eliminate any answer choices that don't seem to fit the details, and then make an educated guess from the remaining options.
upvoted 0 times
...
Wilburn
1 month ago
This looks tricky, but I'm confident I can figure it out. I just need to recall the different port scanning approaches we covered and apply that knowledge to determine the right answer.
upvoted 0 times
...
Micaela
2 months ago
Okay, I've got a strategy - I'll carefully read through the answer choices and think about which one best matches the details provided in the question. The key is to understand the specific technique being referenced.
upvoted 0 times
...
Laurene
2 months ago
Hmm, I'm a bit confused by the specific details about the TTL and GIACing2 utility. I'll need to make sure I understand how those factors relate to the attack being described.
upvoted 0 times
...
Kassandra
2 months ago
I think this is asking about a type of port scanning technique, so I'd start by reviewing my notes on different port scanning methods and their characteristics.
upvoted 0 times
...

Save Cancel