Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GPEN Topic 5 Question 64 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 64
Topic #: 5
[All GPEN Questions]

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Salena
16 days ago
Session hijacking? More like session 'high-jacking'! Am I right, folks? Hey, at least I'm keeping it light in these trying times.
upvoted 0 times
...
Maricela
23 days ago
B and D are no-brainers, but A? Slowing down the network? That's like trying to catch a fish with a stick of dynamite. Not very subtle, is it?
upvoted 0 times
Willard
2 days ago
B) TCP session hijacking is when a hacker takes over a TCP session between two machines.
upvoted 0 times
...
Georgiann
9 days ago
A) It is used to slow the working of victim's network resources.
upvoted 0 times
...
...
Cristal
26 days ago
Wow, this is a tricky one. I'm going to go with B, C, and D. A sounds more like a denial of service attack, not session hijacking.
upvoted 0 times
...
Dylan
1 months ago
I believe C is also true. Using a long random session key can definitely help prevent session hijacking.
upvoted 0 times
...
Vicente
1 months ago
All of these answers seem relevant to session hijacking. C is a good way to mitigate the risk, but you can never be too careful.
upvoted 0 times
Ming
14 hours ago
B) TCP session hijacking is when a hacker takes over a TCP session between two machines.
upvoted 0 times
...
Lazaro
6 days ago
A) It is used to slow the working of victim's network resources.
upvoted 0 times
...
...
Daniel
1 months ago
I agree with you, Ira. TCP session hijacking and unauthorized access are definitely part of session hijacking.
upvoted 0 times
...
Raul
1 months ago
B and D are definitely true. Session hijacking is a real threat and can lead to some serious security issues. I'm not sure about A though, seems a bit off.
upvoted 0 times
...
Ira
1 months ago
I think B and D are true.
upvoted 0 times
...

Save Cancel
a