New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 5 Question 48 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 48
Topic #: 5
[All GPEN Questions]

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Daniel
3 months ago
Not sure about ARP spoofing being related to session hijacking.
upvoted 0 times
...
Francene
3 months ago
Totally agree with you, Brittni!
upvoted 0 times
...
Cassie
3 months ago
Wait, session fixation? Really? That's surprising!
upvoted 0 times
...
Jolanda
4 months ago
I think D is also a valid method.
upvoted 0 times
...
Brittni
4 months ago
Definitely A, B, and C can be used for session hijacking.
upvoted 0 times
...
Wei
4 months ago
I practiced a similar question last week, and I think both session sidejacking and session fixation are correct answers.
upvoted 0 times
...
Rocco
4 months ago
Cross-site scripting sounds familiar in the context of session hijacking, but I can't recall if it's directly related.
upvoted 0 times
...
Marcelle
4 months ago
I think session sidejacking is definitely a method used for session hijacking, but I'm a bit confused about session fixation.
upvoted 0 times
...
Arlyne
5 months ago
I remember that session hijacking can involve different techniques, but I'm not sure if ARP spoofing is one of them.
upvoted 0 times
...
Dion
5 months ago
I'm a bit confused on this one. I know session hijacking is a common attack, but I'm not sure which specific techniques are used. I'll have to carefully consider each of these options and make sure I understand the differences between them.
upvoted 0 times
...
Derrick
5 months ago
Okay, I've got this. Cross-site scripting, session sidejacking, and session fixation can all be used to perform session hijacking. ARP spoofing is a network-level attack, so that's not the right answer here.
upvoted 0 times
...
Ma
5 months ago
I'm pretty sure cross-site scripting and session sidejacking can be used for session hijacking, but I'm not sure about the other options. I'll need to think this through carefully.
upvoted 0 times
...
Candra
5 months ago
Hmm, this is a tricky one. I know session hijacking can be done through cross-site scripting, but I'm not sure about the other choices. I'll have to review my notes on web application security to make sure I get this right.
upvoted 0 times
...
Sue
5 months ago
I've seen questions like this before. I think the router will accept the update and just ignore the unrecognized attribute. That's my best guess.
upvoted 0 times
...
Dierdre
5 months ago
Hmm, this is a tough one. I'm torn between Equivalence Partitioning and Boundary Value Analysis. Both seem relevant given the full set of documentation available, but I'll need to think it through carefully.
upvoted 0 times
...
Tawanna
5 months ago
Hmm, I'm a bit confused on this one. I'll have to review the Cisco UCS boot configuration details again.
upvoted 0 times
...
Gabriele
5 months ago
I'm feeling pretty confident about this one. Activity-based costing provides much more detailed and accurate cost information compared to traditional methods. This helps management make better decisions.
upvoted 0 times
...
Felix
9 months ago
Session hijacking? I prefer to hijack my neighbor's Netflix account, much less jail time involved.
upvoted 0 times
...
Alaine
9 months ago
Cross-site scripting, ARP spoofing, session sidejacking, and session fixation? Looks like a buffet of hacking techniques to me.
upvoted 0 times
Chuck
8 months ago
D) Session fixation
upvoted 0 times
...
Hubert
8 months ago
C) Session sidejacking
upvoted 0 times
...
Leana
8 months ago
B) ARP spoofing
upvoted 0 times
...
Amira
8 months ago
A) Cross-site scripting
upvoted 0 times
...
...
Maile
9 months ago
All the answers look legit, but I'm going with the classic - session fixation. It's the one that screams 'I'm a security expert' the loudest.
upvoted 0 times
...
Mabel
10 months ago
Session hijacking? I'd rather hijack a plane, at least that's a bit more exciting.
upvoted 0 times
Malcom
8 months ago
D) Session fixation
upvoted 0 times
...
Lemuel
8 months ago
C) Session sidejacking
upvoted 0 times
...
Donte
8 months ago
B) ARP spoofing
upvoted 0 times
...
Bobbye
8 months ago
A) Cross-site scripting
upvoted 0 times
...
Lemuel
8 months ago
D) Session fixation
upvoted 0 times
...
Leslie
8 months ago
C) Session sidejacking
upvoted 0 times
...
Goldie
9 months ago
B) ARP spoofing
upvoted 0 times
...
Ceola
9 months ago
A) Cross-site scripting
upvoted 0 times
...
...
Ligia
10 months ago
ARP spoofing and session sidejacking? Sounds like a hacker's dream team!
upvoted 0 times
Keva
8 months ago
It's important to be aware of these techniques to protect against session hijacking attacks.
upvoted 0 times
...
Charlie
8 months ago
Session fixation is another method that can be used for session hijacking.
upvoted 0 times
...
Dudley
9 months ago
Session fixation is another method that can be used for session hijacking.
upvoted 0 times
...
Billy
9 months ago
Cross-site scripting can also be used for session hijacking.
upvoted 0 times
...
Latosha
9 months ago
Cross-site scripting can also be used for session hijacking.
upvoted 0 times
...
Lilli
9 months ago
Yes, ARP spoofing and session sidejacking are commonly used by hackers.
upvoted 0 times
...
Truman
9 months ago
Yes, ARP spoofing and session sidejacking are both commonly used by hackers.
upvoted 0 times
...
...
Arminda
10 months ago
I believe D, session fixation, can also be used for session hijacking. It's important to be aware of all possible methods.
upvoted 0 times
...
Cordelia
11 months ago
I agree with Cortney. Cross-site scripting, ARP spoofing, and session sidejacking are common methods for session hijacking.
upvoted 0 times
...
Cortney
11 months ago
I think A, B, and C can be used for session hijacking.
upvoted 0 times
...

Save Cancel