New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISF Exam - Topic 2 Question 44 Discussion

Actual exam question for GIAC's GISF exam
Question #: 44
Topic #: 2
[All GISF Questions]

Which of the following protocols provides connectionless integrity and data origin authentication of IPpackets?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Carmen
3 months ago
Pretty sure it's D, but I could be wrong.
upvoted 0 times
...
Veronica
3 months ago
Surprised to see AH here, I didn't expect that!
upvoted 0 times
...
Leota
3 months ago
No way, I always thought IKE was the answer!
upvoted 0 times
...
Loren
4 months ago
I thought it was ESP, but I guess AH is the right one.
upvoted 0 times
...
Tuyet
4 months ago
It's definitely D, AH provides that integrity and authentication.
upvoted 0 times
...
Lilli
4 months ago
I think AH is the one that focuses on data origin authentication, but I might be mixing it up with ESP.
upvoted 0 times
...
Salome
4 months ago
I feel like I read that IKE is more about key exchange, so it can't be the right answer here.
upvoted 0 times
...
Ashlee
4 months ago
I remember practicing a question about ESP and AH, but I can't recall which one specifically provides connectionless integrity.
upvoted 0 times
...
Artie
5 months ago
I think the answer might be D, AH, because it provides authentication for IP packets, but I'm not entirely sure.
upvoted 0 times
...
Destiny
5 months ago
This is a good question to test our understanding of IPsec. I'll carefully consider each option and try to eliminate the ones that don't match the description.
upvoted 0 times
...
Earleen
5 months ago
I think AH might also provide integrity and authentication, but I'm not as confident about that one. I'll double-check the details.
upvoted 0 times
...
Sarina
5 months ago
Okay, I know ESP provides encryption and integrity protection for IP packets, so that seems like the most likely answer here.
upvoted 0 times
...
Thora
5 months ago
Hmm, I'm a bit confused on the difference between some of these protocols. I'll need to think through the details of each one.
upvoted 0 times
...
Mayra
5 months ago
I'm pretty sure this is asking about IPsec protocols, so I'll focus on the options related to that.
upvoted 0 times
...
Ines
5 months ago
This looks like a straightforward question, but I want to make sure I understand the implications of the warning. I'll need to think through each option and how it relates to the delivery and deployment process.
upvoted 0 times
...
Frankie
5 months ago
Okay, let's see here. The output mentions a problem with process 2732, so I'll need to investigate that further to figure out what's causing the issue.
upvoted 0 times
...
Felicitas
5 months ago
I've seen similar questions where 5Cr-0.5Mo was mentioned, but that seems more suited for high-temperature applications, right?
upvoted 0 times
...
Carline
10 months ago
C) AH, because who doesn't love a good 'Authentication Header' to start their day? It's like a security blanket for your IP packets.
upvoted 0 times
Goldie
9 months ago
C) AH is the correct choice for connectionless integrity and data origin authentication of IP packets.
upvoted 0 times
...
Lavelle
9 months ago
B) ESP is another option for providing security to IP packets.
upvoted 0 times
...
Lewis
9 months ago
A) IKE provides connectionless integrity and data origin authentication of IP packets.
upvoted 0 times
...
...
Yolande
10 months ago
A) IKE? Hah! That's for negotiating the security parameters, not the actual data protection. Sounds like someone needs to go back to Networking 101.
upvoted 0 times
Carry
8 months ago
C) AH
upvoted 0 times
...
Mose
8 months ago
B) ESP
upvoted 0 times
...
Stephane
9 months ago
C) AH
upvoted 0 times
...
Dacia
9 months ago
B) ESP
upvoted 0 times
...
...
Ramonita
10 months ago
You might be right, ESP does provide those features as well. Let's review the options again.
upvoted 0 times
...
Eve
10 months ago
I disagree, I believe the correct answer is B) ESP as it also provides these security features for IP packets.
upvoted 0 times
...
Lura
10 months ago
D) ISAKMP? Really? That's for setting up the security association, not the actual data protection. Come on, people, let's get our protocols straight!
upvoted 0 times
Bonita
10 months ago
C) AH also provides connectionless integrity and data origin authentication of IP packets.
upvoted 0 times
...
Millie
10 months ago
A) IKE provides connectionless integrity and data origin authentication of IP packets.
upvoted 0 times
...
...
Nikita
10 months ago
B) ESP seems like the obvious choice here. It provides both confidentiality and data origin authentication, which is exactly what the question is asking for.
upvoted 0 times
...
Dong
11 months ago
C) AH, of course! That's the one that ensures the integrity and authenticity of IP packets without the overhead of a full-blown connection.
upvoted 0 times
Candra
9 months ago
True, AH provides the necessary security without the need for a full connection setup.
upvoted 0 times
...
Hoa
9 months ago
But AH is specifically designed for that purpose, so it's the best choice.
upvoted 0 times
...
Tayna
10 months ago
I think ISAKMP is also a good option for securing IP packets.
upvoted 0 times
...
Willodean
10 months ago
I agree, AH is the way to go for connectionless integrity and data origin authentication.
upvoted 0 times
...
...
Ramonita
11 months ago
I think the answer is C) AH because it provides connectionless integrity and data origin authentication.
upvoted 0 times
...

Save Cancel