Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 6 Question 37 Discussion

Actual exam question for GIAC's GISF exam
Question #: 37
Topic #: 6
[All GISF Questions]

John works as a Network Security Professional. He is assigned a project to test the security of

www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.

Which of the following attacking methods can he use to send the dangerous software protocols?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Jerilyn
3 months ago
I bet the company's IT team is just sitting back and chuckling at these options. They probably have a secret backdoor that's not even on the list.
upvoted 0 times
Glory
1 months ago
C) URL obfuscation
upvoted 0 times
...
Tammi
2 months ago
B) MAC spoofing
upvoted 0 times
...
Elena
2 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Nobuko
3 months ago
Banner grabbing? What is this, the 90s? We're talking about dangerous software protocols, not gathering information.
upvoted 0 times
Ira
2 months ago
URL obfuscation can hide the malicious URLs.
upvoted 0 times
...
Stephane
2 months ago
MAC spoofing can help in sending dangerous software protocols.
upvoted 0 times
...
Tonette
2 months ago
HTTP tunneling can bypass the port restrictions.
upvoted 0 times
...
Salome
2 months ago
D) Banner grabbing
upvoted 0 times
...
Ronnie
2 months ago
C) URL obfuscation
upvoted 0 times
...
Leigha
3 months ago
B) MAC spoofing
upvoted 0 times
...
Eleni
3 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Brock
3 months ago
URL obfuscation? That's just hiding the problem, not solving it. John needs a way to actually get the data through that open port.
upvoted 0 times
Leigha
2 months ago
D) Banner grabbing
upvoted 0 times
...
Laurel
2 months ago
C) URL obfuscation
upvoted 0 times
...
Tamra
2 months ago
B) MAC spoofing
upvoted 0 times
...
Therese
3 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Irene
4 months ago
MAC spoofing? Seriously? That's not going to help with the port restrictions. This is clearly an HTTP issue.
upvoted 0 times
Reyes
2 months ago
D) Banner grabbing
upvoted 0 times
...
Romana
2 months ago
C) URL obfuscation
upvoted 0 times
...
Latosha
2 months ago
B) MAC spoofing
upvoted 0 times
...
Timothy
3 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Lucina
4 months ago
HTTP tunneling seems like the obvious choice here. If the company has blocked all ports except 80, then using that port for transmission is the way to go.
upvoted 0 times
Antonio
2 months ago
I agree, HTTP tunneling would be the best option in this scenario.
upvoted 0 times
...
Jenise
2 months ago
A) HTTP tunneling
upvoted 0 times
...
Tonja
3 months ago
I don't think URL obfuscation would work in this case since the company has blocked all ports except port 80.
upvoted 0 times
...
Samira
3 months ago
C) URL obfuscation
upvoted 0 times
...
Tomoko
3 months ago
That's right, HTTP tunneling would allow John to bypass the port restrictions and send the dangerous software protocols.
upvoted 0 times
...
Clemencia
3 months ago
A) HTTP tunneling
upvoted 0 times
...
...
Cristina
4 months ago
I believe URL obfuscation could also be a potential method to send dangerous software protocols.
upvoted 0 times
...
Natalya
4 months ago
I agree with Lashawna, HTTP tunneling can bypass the port restrictions.
upvoted 0 times
...
Lashawna
4 months ago
I think John can use HTTP tunneling to send dangerous software protocols.
upvoted 0 times
...

Save Cancel