New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 3 Question 80 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 80
Topic #: 3
[All GPEN Questions]

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Louvenia
3 days ago
D) Fragmentation overlap seems like the most likely option to me.
upvoted 0 times
...
Brock
8 days ago
Fragmentation overwrite sounds like a cool attack, but I'm not sure if it's the right answer here.
upvoted 0 times
...
Dalene
13 days ago
I think the answer is B) Evasion.
upvoted 0 times
...
Derick
18 days ago
I definitely remember that evasion attacks can trick IDS, so I'm leaning towards option B, but I need to double-check my notes.
upvoted 0 times
...
Kenneth
24 days ago
I feel like the answer could be fragmentation overwrite, but I also have a nagging feeling it might be something else.
upvoted 0 times
...
Rhea
29 days ago
I remember practicing a question about fragmentation overlap, but I can't recall if that one fits this scenario.
upvoted 0 times
...
Izetta
1 month ago
I think this might be related to the evasion techniques we discussed, but I'm not entirely sure if it's the right answer.
upvoted 0 times
...
Amalia
1 month ago
Hmm, this is a tricky one. I'm going to have to really think through the differences between these attack types and how the IDS and host system might respond differently. I'll make sure I understand the concepts before answering.
upvoted 0 times
...
Markus
1 month ago
I've seen questions like this before. I think the key is understanding how the IDS and host system process fragmented packets. B) Evasion sounds right, but I'll review my notes to be sure.
upvoted 0 times
...
Kallie
2 months ago
Okay, let's see. I'm pretty sure it's not A) Insertion or C) Fragmentation overwrite, since those don't seem to match the description. I'm leaning towards D) Fragmentation overlap, but I'll double-check my understanding.
upvoted 0 times
...
Tien
2 months ago
I'm a bit confused on this one. Is it something to do with how the IDS and host system handle fragmented packets differently? I'll have to think it through carefully.
upvoted 0 times
...
Shasta
2 months ago
Hmm, this one's tricky. I think it might be B) Evasion, where the IDS misses the malicious packet but the host system accepts it.
upvoted 0 times
...

Save Cancel