GIAC Certified Perimeter Protection Analyst GPPA Question # 67 Topic 7 Discussion

GIAC Certified Perimeter Protection Analyst GPPA Question # 67 Topic 7 Discussion

GPPA Exam Topic 7 Question 67 Discussion:
Question #: 67
Topic #: 7

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.

Which of the following tools will John use to accomplish his task?


A.

PsList


B.

Fpipe


C.

Cain


D.

PsExec


Get Premium GPPA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.