New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 6 Question 37 Discussion

Actual exam question for GIAC's GISF exam
Question #: 37
Topic #: 6
[All GISF Questions]

John works as a Network Security Professional. He is assigned a project to test the security of

www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.

Which of the following attacking methods can he use to send the dangerous software protocols?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Mable
3 months ago
Banner grabbing seems less relevant for this scenario.
upvoted 0 times
...
Ashlyn
3 months ago
Wait, can you really send dangerous protocols over port 80?
upvoted 0 times
...
Vanesa
3 months ago
Not sure about MAC spoofing being effective here.
upvoted 0 times
...
Estrella
4 months ago
I think URL obfuscation could work too!
upvoted 0 times
...
Vicki
4 months ago
HTTP tunneling is definitely a method to consider.
upvoted 0 times
...
Eleonore
4 months ago
Banner grabbing seems unrelated to sending dangerous software; it’s more about gathering information, right?
upvoted 0 times
...
Shaun
4 months ago
I practiced a question similar to this, and I think MAC spoofing is more about changing device addresses rather than sending protocols.
upvoted 0 times
...
Rodrigo
4 months ago
I'm not entirely sure, but I feel like URL obfuscation could also be a method to disguise malicious payloads sent over port 80.
upvoted 0 times
...
Flo
5 months ago
I remember studying HTTP tunneling as a way to bypass firewalls, so I think that might be the right answer here.
upvoted 0 times
...
Argelia
5 months ago
HTTP tunneling is the obvious choice. It's a well-known technique for evading network security controls. I feel confident about this one.
upvoted 0 times
...
Aleta
5 months ago
I'm a bit confused on the best method here. I'll need to review my notes on network security attacks to make sure I choose the right option.
upvoted 0 times
...
Lucina
5 months ago
HTTP tunneling is definitely the right approach. That's the classic way to bypass port restrictions and send malicious traffic through the firewall.
upvoted 0 times
...
Ceola
5 months ago
Hmm, I'm not too sure about this one. I'll need to think it through carefully before answering. Gotta make sure I don't miss anything.
upvoted 0 times
...
Lili
5 months ago
This seems like a straightforward question about bypassing network security. I think HTTP tunneling is the way to go here.
upvoted 0 times
...
Noemi
5 months ago
Wait, I thought the PMK was communicated to clients in WPA3-Personal. I'll have to double-check that detail before answering.
upvoted 0 times
...
Erinn
5 months ago
I think I've got this one figured out. The key is to identify the combination of factors that would prevent data entry, rather than just looking at individual causes. I'm going to carefully evaluate each option and see which one best matches the scenario described.
upvoted 0 times
...
Elise
5 months ago
I think most health plans do require a referral for CAM benefits, but I'm not completely sure if it's always the case.
upvoted 0 times
...
Jerilyn
10 months ago
I bet the company's IT team is just sitting back and chuckling at these options. They probably have a secret backdoor that's not even on the list.
upvoted 0 times
Glory
8 months ago
C) URL obfuscation
upvoted 0 times
...
Tammi
8 months ago
B) MAC spoofing
upvoted 0 times
...
Elena
8 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Nobuko
10 months ago
Banner grabbing? What is this, the 90s? We're talking about dangerous software protocols, not gathering information.
upvoted 0 times
Ira
8 months ago
URL obfuscation can hide the malicious URLs.
upvoted 0 times
...
Stephane
8 months ago
MAC spoofing can help in sending dangerous software protocols.
upvoted 0 times
...
Tonette
8 months ago
HTTP tunneling can bypass the port restrictions.
upvoted 0 times
...
Salome
9 months ago
D) Banner grabbing
upvoted 0 times
...
Ronnie
9 months ago
C) URL obfuscation
upvoted 0 times
...
Leigha
9 months ago
B) MAC spoofing
upvoted 0 times
...
Eleni
9 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Brock
10 months ago
URL obfuscation? That's just hiding the problem, not solving it. John needs a way to actually get the data through that open port.
upvoted 0 times
Leigha
8 months ago
D) Banner grabbing
upvoted 0 times
...
Laurel
9 months ago
C) URL obfuscation
upvoted 0 times
...
Tamra
9 months ago
B) MAC spoofing
upvoted 0 times
...
Therese
9 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Irene
10 months ago
MAC spoofing? Seriously? That's not going to help with the port restrictions. This is clearly an HTTP issue.
upvoted 0 times
Reyes
9 months ago
D) Banner grabbing
upvoted 0 times
...
Romana
9 months ago
C) URL obfuscation
upvoted 0 times
...
Latosha
9 months ago
B) MAC spoofing
upvoted 0 times
...
Timothy
9 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Lucina
10 months ago
HTTP tunneling seems like the obvious choice here. If the company has blocked all ports except 80, then using that port for transmission is the way to go.
upvoted 0 times
Antonio
9 months ago
I agree, HTTP tunneling would be the best option in this scenario.
upvoted 0 times
...
Jenise
9 months ago
A) HTTP tunneling
upvoted 0 times
...
Tonja
9 months ago
I don't think URL obfuscation would work in this case since the company has blocked all ports except port 80.
upvoted 0 times
...
Samira
9 months ago
C) URL obfuscation
upvoted 0 times
...
Tomoko
9 months ago
That's right, HTTP tunneling would allow John to bypass the port restrictions and send the dangerous software protocols.
upvoted 0 times
...
Clemencia
9 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Cristina
10 months ago
I believe URL obfuscation could also be a potential method to send dangerous software protocols.
upvoted 0 times
...
Natalya
11 months ago
I agree with Lashawna, HTTP tunneling can bypass the port restrictions.
upvoted 0 times
...
Lashawna
11 months ago
I think John can use HTTP tunneling to send dangerous software protocols.
upvoted 0 times
...

Save Cancel