New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 7 Question 3 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 3
Topic #: 7
[All GCIH Questions]

Which of the following describes network traffic that originates from the inside of a network perimeter and progresses towards the outside?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Glory
3 months ago
Egress is correct, but why do they call it that?
upvoted 0 times
...
Colby
3 months ago
I thought it was Ingress at first, but Egress makes sense.
upvoted 0 times
...
Bernardine
4 months ago
Wait, are we sure it's not A? Seems confusing.
upvoted 0 times
...
Julieta
4 months ago
Totally agree, Egress is the right term!
upvoted 0 times
...
Augustine
4 months ago
It's definitely C, Egress network.
upvoted 0 times
...
Audry
4 months ago
I definitely recall that egress is used for traffic going out, so I’m leaning towards C, but I hope I’m not mixing it up with something else!
upvoted 0 times
...
Glory
4 months ago
I'm a bit confused between C and D. I feel like egress is the correct term, but outwards network sounds familiar too.
upvoted 0 times
...
Sommer
5 months ago
I remember practicing a similar question, and I think ingress refers to incoming traffic, so that rules out A.
upvoted 0 times
...
Judy
5 months ago
I think the answer might be C, Egress network, but I'm not entirely sure if that's the right term for traffic leaving the network.
upvoted 0 times
...
Fannie
5 months ago
Wait, I'm not sure. The compareTo() method compares the names, but the toString() method includes both the number and name. Could that cause a problem with the sorting?
upvoted 0 times
...
Judy
5 months ago
Hmm, I'm not too sure about this one. I know SysAnalyzer can be used for general system analysis, but I'm not confident it would be the best tool for finding the packaging software. Maybe I should review my notes on malware analysis tools.
upvoted 0 times
...
Patti
5 months ago
The question is asking about a specific feature of Aviatrix Controller, so I'll need to make sure I understand how that feature works. I'll try to think through the use case and see if the VPC Tracker can help validate the CIDR/Prefix/Address space.
upvoted 0 times
...
Andra
5 months ago
Visibility/graphic overrides sounds right to me. That's the option that makes the most sense for controlling the visibility of a wall in a view.
upvoted 0 times
...

Save Cancel