Exam GCIH All QuestionsBrowse all questions from this exam
Question 10

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.

How was security compromised and how did the firewall respond?

    Correct Answer: D

    The security was compromised because a keylogger was embedded into the webpage, and keyloggers typically operate without being detected by firewalls. Firewalls mainly operate by examining incoming and outgoing network traffic for suspicious activity, but a keylogger can capture keystrokes locally on the machine and then send the captured data in a way that appears to be normal traffic or within an encrypted channel, thus avoiding detection by a firewall. Therefore, the firewall would not have been able to respond to the embedded keylogger effectively.

Discussion
ornek1Option: D

D. Security was compromised as keylogger is invisible for firewall