GIAC Certified Enterprise Defender GCED Question # 15 Topic 2 Discussion

GIAC Certified Enterprise Defender GCED Question # 15 Topic 2 Discussion

GCED Exam Topic 2 Question 15 Discussion:
Question #: 15
Topic #: 2

How would an attacker use the following configuration settings?

GCED Question 15


A.

A client based HIDS evasion attack


B.

A firewall based DDoS attack


C.

A router based MITM attack


D.

A switch based VLAN hopping attack


Get Premium GCED Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.