Certified Ethical Hacker (CEH) Practice Question

While monitoring a Telnet session during a penetration test, you capture a few packets just long enough to determine the server's next TCP sequence number. You immediately forge and transmit a single packet that spoofs the client's address and contains a malicious command, relying on the predicted sequence so the server accepts the data even though you cannot see any subsequent responses. Which attack technique does this illustrate?

  • TCP sequence-prediction (TCP hijacking) attack

  • Web application session fixation

  • SSL stripping downgrade attack

  • Man-in-the-middle via ARP spoofing

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot