GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 10


Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.

How was security compromised and how did the firewall respond?

Show Answer
Correct Answer: D

The security was compromised because a keylogger was embedded into the webpage, and keyloggers typically operate without being detected by firewalls. Firewalls mainly operate by examining incoming and outgoing network traffic for suspicious activity, but a keylogger can capture keystrokes locally on the machine and then send the captured data in a way that appears to be normal traffic or within an encrypted channel, thus avoiding detection by a firewall. Therefore, the firewall would not have been able to respond to the embedded keylogger effectively.

Discussion

1 comment
Sign in to comment
ornek1Option: D
Jun 25, 2024

D. Security was compromised as keylogger is invisible for firewall