New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 9 Question 41 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 41
Topic #: 9
[All GCIH Questions]

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Shaun
2 months ago
B is correct, but I wonder how common this really is.
upvoted 0 times
...
Cordie
2 months ago
Nah, it’s not D, Social Engineering doesn’t control sessions.
upvoted 0 times
...
Ressie
2 months ago
Wait, can a Trojan horse really do that? Sounds sketchy!
upvoted 0 times
...
Cordie
3 months ago
I thought it was A at first, but B makes more sense.
upvoted 0 times
...
Madonna
3 months ago
Definitely B, Session Hijacking is the right answer.
upvoted 0 times
...
Georgiann
3 months ago
I’m a bit confused; I thought social engineering was more about manipulating people rather than directly taking over a session.
upvoted 0 times
...
Ben
3 months ago
I feel like I've seen a question like this before, and session hijacking was definitely mentioned as a risk with non-encrypted protocols.
upvoted 0 times
...
Kate
4 months ago
I'm not entirely sure, but I remember something about how dictionary attacks are more about cracking passwords rather than taking over sessions.
upvoted 0 times
...
Alex
4 months ago
I think session hijacking is the right answer here. We talked about it in class, and it involves taking control of an active session.
upvoted 0 times
...
Francine
4 months ago
This is a good question to test our understanding of common network attacks. I feel confident in my ability to identify session hijacking as the correct response.
upvoted 0 times
...
Claudio
4 months ago
Okay, I've got it. Session Hijacking is the technique that allows an attacker to take over an existing connection. That's the answer I'm going with.
upvoted 0 times
...
Gregoria
4 months ago
I'm a bit confused on the difference between a dictionary attack and session hijacking. I'll need to review those concepts before answering.
upvoted 0 times
...
Ines
5 months ago
Session Hijacking seems like the most likely answer here. That's when an attacker takes control of an active session between a client and server.
upvoted 0 times
...
Alfreda
5 months ago
Hmm, this looks like a tricky one. I'll need to think carefully about the different types of attacks that can target unencrypted protocols.
upvoted 0 times
...
Hildegarde
8 months ago
I believe the correct answer is B) Session Hijacking, as it specifically mentions taking control of a session between a server and a client using non-encrypted TCP/IP utilities.
upvoted 0 times
...
Bernardine
9 months ago
I'm not sure, but I think A) Dictionary attack could also be a possibility.
upvoted 0 times
...
Tina
9 months ago
I agree with Felix, because session hijacking involves taking control of a session between a server and a client.
upvoted 0 times
...
Felix
9 months ago
I think the answer is B) Session Hijacking.
upvoted 0 times
...
Barrett
9 months ago
Trojan horse? Is this an IT exam or a Greek history lesson? Session Hijacking all the way!
upvoted 0 times
Adela
8 months ago
Trojan horse may sound cool, but Session Hijacking is the real deal.
upvoted 0 times
...
Cora
8 months ago
Yeah, it's definitely the most effective method.
upvoted 0 times
...
Ahmed
9 months ago
I agree, Session Hijacking is the way to go.
upvoted 0 times
...
...
Vi
9 months ago
Social Engineering? Pffft, that's for amateurs. Session Hijacking is where it's at, my friends.
upvoted 0 times
...
Shawnda
10 months ago
Dictionary attack? More like a word salad attack on my brain. Let's go with session hijacking, that's the real deal.
upvoted 0 times
Louvenia
8 months ago
Session hijacking is a serious threat when it comes to controlling a session between a server and a client.
upvoted 0 times
...
Mireya
8 months ago
Yeah, dictionary attacks can be overwhelming. Session hijacking is more targeted.
upvoted 0 times
...
Loren
9 months ago
I agree, session hijacking is definitely the way to go.
upvoted 0 times
...
...
Nada
10 months ago
Session Hijacking? Nah, that's too easy. I'm going with Trojan horse - classic and never gets old.
upvoted 0 times
Elza
9 months ago
Social Engineering is always a strong contender too.
upvoted 0 times
...
Sarah
9 months ago
I think Dictionary attack could also be a good option.
upvoted 0 times
...
Lonny
9 months ago
Trojan horse - sneaky choice!
upvoted 0 times
...
...
Antonio
10 months ago
Session Hijacking? Sounds like something straight out of a spy movie! Count me in, I'm feeling 007 today.
upvoted 0 times
Maile
9 months ago
C) Trojan horse
upvoted 0 times
...
Elke
10 months ago
B) Session Hijacking
upvoted 0 times
...
Gwenn
10 months ago
A) Dictionary attack
upvoted 0 times
...
...

Save Cancel