New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 1 Question 46 Discussion

Actual exam question for GIAC's GISP exam
Question #: 46
Topic #: 1
[All GISP Questions]

A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Chun
3 months ago
I thought DoS was more common, this is surprising!
upvoted 0 times
...
Bobbye
3 months ago
Man-in-the-middle is the classic example.
upvoted 0 times
...
Belen
3 months ago
Wait, are we sure it's not a Brute force attack?
upvoted 0 times
...
Leonora
4 months ago
Totally agree, that's the right answer.
upvoted 0 times
...
Gregg
4 months ago
It's definitely a Man-in-the-middle attack!
upvoted 0 times
...
Stefany
4 months ago
I'm a bit confused; I thought "Denial of Service" was about overwhelming a server, not intercepting communication.
upvoted 0 times
...
Anglea
4 months ago
I feel like "brute force" and "dictionary" attacks are more about cracking passwords, so they don't fit here.
upvoted 0 times
...
Rikki
4 months ago
I remember practicing a question like this, and I think "man-in-the-middle" is definitely the right term.
upvoted 0 times
...
Pamela
5 months ago
I think this is about a type of attack where someone intercepts communication, but I'm not completely sure if it's called "man-in-the-middle."
upvoted 0 times
...
Virgie
5 months ago
This is a classic cybersecurity question. The key is to focus on the description of the attack, not just the name. An attacker inserting something between communicating hosts - that's textbook man-in-the-middle. I'm confident A is the right answer here.
upvoted 0 times
...
Kris
5 months ago
I'm a bit confused by the wording of this question. Is it asking about a specific type of attack, or just any kind of attack where an attacker inserts something between hosts? I'll have to re-read it a few times to make sure I understand.
upvoted 0 times
...
An
5 months ago
Hmm, I'm a bit unsure about this one. I know there are different types of attacks, but I can't quite remember the details of a man-in-the-middle attack. I'll have to think it through carefully.
upvoted 0 times
...
Avery
5 months ago
This one seems straightforward. I'm pretty confident I know the answer is A. Man-in-the-middle attacks are all about inserting an intermediary between communicating hosts.
upvoted 0 times
...
Noemi
5 months ago
Okay, let me think this through step-by-step. The question is asking about an attack where an attacker inserts a program between two communicating hosts. That sounds like a man-in-the-middle attack to me. I'm going to go with A.
upvoted 0 times
...
Margurite
5 months ago
I think the key here is understanding how the QVWS interacts with the QlikView Servers. If the web server can't start, that would likely block user access, but I'm not sure it would impact the servers themselves. I'll focus on A and B for my answer.
upvoted 0 times
...
Halina
5 months ago
This seems like a straightforward question about task management in Salesforce. I'll carefully review the options and think through the likely functionality.
upvoted 0 times
...
Clemencia
2 years ago
Thanks, everyone. Feels good to have a consensus!
upvoted 0 times
...
Mickie
2 years ago
Yeah, DoS is more about overwhelming the target. Man-in-the-middle is about intercepting communication.
upvoted 0 times
...
Alease
2 years ago
I was thinking it might be C) Denial of Service, but now I see why A makes more sense.
upvoted 0 times
...
Benedict
2 years ago
I agree. Man-in-the-middle attacks fit the description perfectly.
upvoted 0 times
...
Mickie
2 years ago
Pretty sure the answer is A) Man-in-the-middle.
upvoted 0 times
...
Clemencia
2 years ago
This is a tricky question. What do you guys think?
upvoted 0 times
...

Save Cancel