Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 8 Question 25 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 25
Topic #: 8
[All GCIH Questions]

Which of the following statements about smurf is true?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Leonora
4 months ago
I'm going with A. It's the only one that really captures the essence of the smurf attack.
upvoted 0 times
...
Malcom
4 months ago
Haha, who comes up with these answer choices? Smurf is definitely not a TCP attack.
upvoted 0 times
...
Leonie
4 months ago
D is just silly. Smurf has nothing to do with leaving TCP ports open.
upvoted 0 times
Galen
3 months ago
I agree, D is definitely not correct. It's between A and B.
upvoted 0 times
...
Roslyn
3 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Latosha
3 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Mickie
3 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Johna
3 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Julianna
4 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
King
4 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Carolynn
4 months ago
I think D) It is a denial of service (DoS) attack that leaves TCP ports open is the right answer based on my understanding.
upvoted 0 times
...
Shawnta
5 months ago
I'm not sure, but I think C) It is an attack with IP fragments that cannot be reassembled makes sense.
upvoted 0 times
...
Tomoko
5 months ago
Hmm, I'm not sure. C sounds like it could be related to smurf, but I can't say for certain.
upvoted 0 times
Jaime
4 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Tiera
4 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Antonio
5 months ago
I disagree, I believe the correct answer is B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Johnetta
5 months ago
B seems more accurate to me. Smurf uses ICMP, not UDP.
upvoted 0 times
Vashti
4 months ago
C) It is an attack with IP fragments that cannot be reassembled.
upvoted 0 times
...
Lilli
4 months ago
B) It is an ICMP attack that involves spoofing and flooding.
upvoted 0 times
...
Jules
4 months ago
A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
...
Beth
5 months ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted 0 times
Delmy
4 months ago
Cherrie: No, it's not. Smurf specifically targets UDP protocols.
upvoted 0 times
...
Lawrence
5 months ago
So, it's not an ICMP attack like option B?
upvoted 0 times
...
Cherrie
5 months ago
Yes, you are correct. Smurf is indeed a UDP attack that involves spoofing and flooding.
upvoted 0 times
...
Lorenza
5 months ago
I think the answer is A. Smurf is a classic UDP-based spoofing and flooding attack.
upvoted 0 times
...
...
Shasta
5 months ago
I think the answer is A) It is a UDP attack that involves spoofing and flooding.
upvoted 0 times
...

Save Cancel