Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 6 Question 37 Discussion

Actual exam question for GIAC's GISF exam
Question #: 37
Topic #: 6
[All GISF Questions]

John works as a Network Security Professional. He is assigned a project to test the security of

www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.

Which of the following attacking methods can he use to send the dangerous software protocols?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Jerilyn
1 months ago
I bet the company's IT team is just sitting back and chuckling at these options. They probably have a secret backdoor that's not even on the list.
upvoted 0 times
Elena
2 days ago
A) HTTP tunneling
upvoted 0 times
...
...
Nobuko
2 months ago
Banner grabbing? What is this, the 90s? We're talking about dangerous software protocols, not gathering information.
upvoted 0 times
Ira
2 days ago
URL obfuscation can hide the malicious URLs.
upvoted 0 times
...
Stephane
5 days ago
MAC spoofing can help in sending dangerous software protocols.
upvoted 0 times
...
Tonette
10 days ago
HTTP tunneling can bypass the port restrictions.
upvoted 0 times
...
Salome
17 days ago
D) Banner grabbing
upvoted 0 times
...
Ronnie
21 days ago
C) URL obfuscation
upvoted 0 times
...
Leigha
27 days ago
B) MAC spoofing
upvoted 0 times
...
Eleni
1 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Brock
2 months ago
URL obfuscation? That's just hiding the problem, not solving it. John needs a way to actually get the data through that open port.
upvoted 0 times
Leigha
8 days ago
D) Banner grabbing
upvoted 0 times
...
Laurel
13 days ago
C) URL obfuscation
upvoted 0 times
...
Tamra
18 days ago
B) MAC spoofing
upvoted 0 times
...
Therese
1 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Irene
2 months ago
MAC spoofing? Seriously? That's not going to help with the port restrictions. This is clearly an HTTP issue.
upvoted 0 times
Reyes
12 days ago
D) Banner grabbing
upvoted 0 times
...
Romana
19 days ago
C) URL obfuscation
upvoted 0 times
...
Latosha
21 days ago
B) MAC spoofing
upvoted 0 times
...
Timothy
1 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Lucina
2 months ago
HTTP tunneling seems like the obvious choice here. If the company has blocked all ports except 80, then using that port for transmission is the way to go.
upvoted 0 times
Antonio
24 days ago
I agree, HTTP tunneling would be the best option in this scenario.
upvoted 0 times
...
Jenise
26 days ago
A) HTTP tunneling
upvoted 0 times
...
Tonja
27 days ago
I don't think URL obfuscation would work in this case since the company has blocked all ports except port 80.
upvoted 0 times
...
Samira
28 days ago
C) URL obfuscation
upvoted 0 times
...
Tomoko
1 months ago
That's right, HTTP tunneling would allow John to bypass the port restrictions and send the dangerous software protocols.
upvoted 0 times
...
Clemencia
1 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Cristina
2 months ago
I believe URL obfuscation could also be a potential method to send dangerous software protocols.
upvoted 0 times
...
Natalya
2 months ago
I agree with Lashawna, HTTP tunneling can bypass the port restrictions.
upvoted 0 times
...
Lashawna
3 months ago
I think John can use HTTP tunneling to send dangerous software protocols.
upvoted 0 times
...

Save Cancel