Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISP Topic 2 Question 60 Discussion

Actual exam question for GIAC's GISP exam
Question #: 60
Topic #: 2
[All GISP Questions]

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Alexis
1 months ago
Ooh, I bet the answer is port redirection. It's like a ninja move, redirecting traffic without the host even knowing!
upvoted 0 times
Lucina
2 days ago
A) Blackbox testing
upvoted 0 times
...
...
Hubert
2 months ago
Brainstorming? Really? That's not even close to the right answer. What kind of test is this?
upvoted 0 times
...
Samira
2 months ago
I'm going with port redirection. It's the only option that really fits the description of the question.
upvoted 0 times
...
Hildegarde
2 months ago
Hmm, I'm not sure. Firewalking sounds like it could work, but I'm not 100% confident.
upvoted 0 times
Antonette
19 days ago
Let's go with port redirection then.
upvoted 0 times
...
Wenona
25 days ago
I'm not sure, but firewalking could also be a possibility.
upvoted 0 times
...
Dallas
28 days ago
I agree, port redirection makes sense.
upvoted 0 times
...
Donte
28 days ago
I'm not sure, but I think it could be blackbox testing.
upvoted 0 times
...
Terrilyn
29 days ago
I think it's port redirection.
upvoted 0 times
...
Dante
1 months ago
I believe firewalking is the correct technique.
upvoted 0 times
...
Alyssa
1 months ago
I think it might be port redirection.
upvoted 0 times
...
...
Christiane
2 months ago
I'm not sure, but I think C) Firewalking could also be a possibility.
upvoted 0 times
...
Nana
2 months ago
I agree with Chauncey, because port redirection allows traffic to be redirected to another host.
upvoted 0 times
...
Jesus
3 months ago
Port redirection, duh! That's the obvious answer here.
upvoted 0 times
Queenie
1 months ago
I agree, port redirection is the technique that allows an attacker to redirect network traffic.
upvoted 0 times
...
Marsha
1 months ago
Yes, port redirection is the correct answer.
upvoted 0 times
...
Floyd
1 months ago
Port redirection, definitely the way to go.
upvoted 0 times
...
Yolando
1 months ago
D) Brainstorming
upvoted 0 times
...
Hershel
1 months ago
C) Firewalking
upvoted 0 times
...
Jody
1 months ago
B) Port redirection
upvoted 0 times
...
Dacia
1 months ago
A) Blackbox testing
upvoted 0 times
...
...
Chauncey
3 months ago
I think the answer is B) Port redirection.
upvoted 0 times
...

Save Cancel