New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 8 Question 25 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 25
Topic #: 8
[All GCIH Questions]

Which of the following statements about smurf is true?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Rosenda
3 months ago
I heard they can leave ports open, but not TCP ones.
upvoted 0 times
...
Ramonita
3 months ago
Smurf attacks are classic DoS techniques.
upvoted 0 times
...
Virgina
3 months ago
Wait, are we sure about that? I thought it was UDP.
upvoted 0 times
...
Rodney
4 months ago
Totally agree, option B is correct.
upvoted 0 times
...
Luisa
4 months ago
It's definitely an ICMP attack!
upvoted 0 times
...
Helaine
4 months ago
I know smurf attacks use ICMP and involve flooding, but I’m not confident about the specifics of the spoofing part.
upvoted 0 times
...
Susana
4 months ago
I feel like smurf attacks involve UDP, but I might be mixing it up with another type of attack.
upvoted 0 times
...
Christiane
4 months ago
I remember practicing a question about DoS attacks, and I think smurf is definitely a type of DoS, but I can't recall the details about TCP ports.
upvoted 0 times
...
Felicia
5 months ago
I think smurf attacks are related to ICMP, but I'm not entirely sure if it's specifically about spoofing and flooding.
upvoted 0 times
...
Judy
5 months ago
Ah, the smurf attack - I know this one. It's a UDP-based spoofing and flooding attack, so A is the correct answer.
upvoted 0 times
...
Sherill
5 months ago
I remember learning about the smurf attack in class. I think it's an ICMP-based attack, so I'll select option B.
upvoted 0 times
...
Kristeen
5 months ago
The key here is understanding the different types of network attacks. I'll review my notes on common DoS and flooding techniques to determine the right answer.
upvoted 0 times
...
Jarvis
5 months ago
Hmm, I'm a bit confused about the difference between ICMP and UDP attacks. I'll have to think this through carefully.
upvoted 0 times
...
Theola
5 months ago
I'm pretty sure the smurf attack involves spoofing and flooding, so I'll go with option A.
upvoted 0 times
...
Lynelle
5 months ago
I'm a bit confused on this one. The licensing phase doesn't sound familiar to me. I'm not sure if that's a standard part of the index time process. Maybe I should review my notes on that before answering.
upvoted 0 times
...
Leonora
1 year ago
I'm going with A. It's the only one that really captures the essence of the smurf attack.
upvoted 0 times
...
Malcom
1 year ago
Haha, who comes up with these answer choices? Smurf is definitely not a TCP attack.
upvoted 0 times
...
Leonie
1 year ago
D is just silly. Smurf has nothing to do with leaving TCP ports open.
upvoted 0 times
Galen
1 year ago
I agree, D is definitely not correct. It's between A and B.
upvoted 0 times
...
Roslyn
1 year ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Latosha
1 year ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Mickie
1 year ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Johna
1 year ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Julianna
1 year ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
King
1 year ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Carolynn
1 year ago
I think D) It is a denial of service (DoS) attack that leaves TCP ports open is the right answer based on my understanding.
upvoted 0 times
...
Shawnta
1 year ago
I'm not sure, but I think C) It is an attack with IP fragments that cannot be reassembled makes sense.
upvoted 0 times
...
Tomoko
2 years ago
Hmm, I'm not sure. C sounds like it could be related to smurf, but I can't say for certain.
upvoted 0 times
Jaime
1 year ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Tiera
1 year ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Antonio
2 years ago
I disagree, I believe the correct answer is B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Johnetta
2 years ago
B seems more accurate to me. Smurf uses ICMP, not UDP.
upvoted 0 times
Vashti
1 year ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Lilli
1 year ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Jules
1 year ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Beth
2 years ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted 0 times
Delmy
1 year ago
Cherrie: No, it's not. Smurf specifically targets UDP protocols.
upvoted 0 times
...
Lawrence
1 year ago
So, it's not an ICMP attack like option B?
upvoted 0 times
...
Cherrie
1 year ago
Yes, you are correct. Smurf is indeed a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
Lorenza
2 years ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted 0 times
...
...
Shasta
2 years ago
I think the answer is A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...

Save Cancel