New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 4 Question 5 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 5
Topic #: 4
[All GCIH Questions]

Which of the following strategies allows a user to limit access according to unique hardware information supplied by a potential client?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Shawn
3 months ago
I agree, C is the best option for limiting access!
upvoted 0 times
...
Flo
3 months ago
Wait, can MAC filtering really be trusted? Seems easy to spoof.
upvoted 0 times
...
Octavio
3 months ago
WEP is outdated, not a good choice here.
upvoted 0 times
...
Lonny
4 months ago
I thought EAP was more about authentication than hardware info?
upvoted 0 times
...
Iraida
4 months ago
Definitely C, MAC address filtering is the way to go!
upvoted 0 times
...
Amie
4 months ago
I practiced a question similar to this, and I think MAC address filtering was the focus. It seems to fit the description best.
upvoted 0 times
...
William
4 months ago
WTLS sounds familiar, but I can't recall it being related to hardware info. I feel like it’s more about securing data in transit.
upvoted 0 times
...
Lavonna
4 months ago
I'm not entirely sure, but I remember EAP being more about authentication protocols rather than limiting access based on hardware.
upvoted 0 times
...
Catrice
5 months ago
I think MAC address filtering is the right answer since it specifically deals with unique hardware identifiers.
upvoted 0 times
...
Lashawnda
5 months ago
Okay, I've got this. The question is asking about limiting access based on unique hardware info, and C - MAC address filtering - is the clear answer here. Confident I can get this one right.
upvoted 0 times
...
Celia
5 months ago
Ah, this is a tricky one. I think the key is looking for a strategy that specifically mentions limiting access based on hardware info. I'm leaning towards C, but I'll double-check my notes just to be sure.
upvoted 0 times
...
Cory
5 months ago
Hmm, I'm a bit unsure about this one. I know MAC address filtering is used for access control, but I'm not sure if it's the best option here. I'll have to think it through more carefully.
upvoted 0 times
...
Graciela
5 months ago
I'm pretty sure the answer is C. MAC address filtering allows you to limit access based on the unique hardware addresses of client devices.
upvoted 0 times
...
Madalyn
5 months ago
I'm leaning towards the ION API Gateway option. That seems to be the interface that connects Infor ION to different applications and data sources.
upvoted 0 times
...
Natalya
5 months ago
I'm a bit confused about the statement regarding the Apex governor limits being relaxed during the constructor call. That doesn't sound quite right to me.
upvoted 0 times
...
Deonna
5 months ago
Okay, I've got this. ERC are for defining standards on Ethereum, while EIP are for improving the Ethereum protocol itself. Option A looks like the right answer.
upvoted 0 times
...
Virgie
5 months ago
Okay, let's think this through. I'm leaning towards option A, customizing the cache keys to omit the protocol from the key. That should help improve the cache hit ratio by reducing the number of unique cache keys.
upvoted 0 times
...

Save Cancel