Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 8 Question 25 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 25
Topic #: 8
[All GCIH Questions]

Which of the following statements about smurf is true?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Leonora
2 months ago
I'm going with A. It's the only one that really captures the essence of the smurf attack.
upvoted 0 times
...
Malcom
3 months ago
Haha, who comes up with these answer choices? Smurf is definitely not a TCP attack.
upvoted 0 times
...
Leonie
3 months ago
D is just silly. Smurf has nothing to do with leaving TCP ports open.
upvoted 0 times
Galen
2 months ago
I agree, D is definitely not correct. It's between A and B.
upvoted 0 times
...
Roslyn
2 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Latosha
2 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Mickie
2 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Johna
2 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Julianna
2 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
King
2 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Carolynn
3 months ago
I think D) It is a denial of service (DoS) attack that leaves TCP ports open is the right answer based on my understanding.
upvoted 0 times
...
Shawnta
3 months ago
I'm not sure, but I think C) It is an attack with IP fragments that cannot be reassembled makes sense.
upvoted 0 times
...
Tomoko
3 months ago
Hmm, I'm not sure. C sounds like it could be related to smurf, but I can't say for certain.
upvoted 0 times
Jaime
3 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Tiera
3 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Antonio
3 months ago
I disagree, I believe the correct answer is B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Johnetta
4 months ago
B seems more accurate to me. Smurf uses ICMP, not UDP.
upvoted 0 times
Vashti
3 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Lilli
3 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Jules
3 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Beth
4 months ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted 0 times
Delmy
3 months ago
Cherrie: No, it's not. Smurf specifically targets UDP protocols.
upvoted 0 times
...
Lawrence
3 months ago
So, it's not an ICMP attack like option B?
upvoted 0 times
...
Cherrie
3 months ago
Yes, you are correct. Smurf is indeed a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
Lorenza
3 months ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted 0 times
...
...
Shasta
4 months ago
I think the answer is A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...

Save Cancel