New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 2 Question 8 Discussion

Actual exam question for GIAC's GISP exam
Question #: 8
Topic #: 2
[All GISP Questions]

Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Huey
4 months ago
Rainbow tables? Really? That's a whole different thing!
upvoted 0 times
...
Lashon
4 months ago
No way, it's all about those access control lists!
upvoted 0 times
...
Sherron
4 months ago
Wait, I thought rootkits were involved in packet filtering?
upvoted 0 times
...
Tyisha
4 months ago
Totally agree, ACLs are key for that.
upvoted 0 times
...
Glory
5 months ago
It's definitely C, access control list!
upvoted 0 times
...
Chauncey
5 months ago
I definitely recall that rainbow tables are related to password cracking, so they can't be the right answer here.
upvoted 0 times
...
Gladys
5 months ago
I'm a bit confused; I thought rootkits and backdoors were more about security breaches rather than packet forwarding.
upvoted 0 times
...
Carey
5 months ago
I remember practicing a similar question about packet filtering, and I think access control lists were mentioned as a key component.
upvoted 0 times
...
Val
5 months ago
I think the answer might be C, access control list, but I'm not entirely sure. It sounds familiar from the lectures.
upvoted 0 times
...
Pearly
5 months ago
I've got a good feeling about this one. I think the answer is Image, since that's a more complex field that requires additional processing.
upvoted 0 times
...
Selma
5 months ago
Hmm, I'm not too familiar with the Cisco Unified Real-Time Monitoring Tool, so I'll have to think this through carefully.
upvoted 0 times
...
Marci
5 months ago
Hmm, I'm not too familiar with Oracle Cloud Adapters. I'll need to think through how they help with integrating cloud-based applications.
upvoted 0 times
...
Daniel
5 months ago
Based on practice questions, I'm leaning towards Activity, Service, Content Provider, and Broadcast Receiver as the ones we need.
upvoted 0 times
...
Peggy
5 months ago
Hmm, I'm not sure about this one. The question says the service compositions are "comprised of services from the same service inventory," but it doesn't explicitly state that there are no other service compositions. I think option C might be the right answer here.
upvoted 0 times
...
Zona
5 months ago
Okay, let's see here. Volatile data is always the first step, that makes sense. Then file slack, registry, and memory dumps - those all seem like logical next steps. I think I've got a good handle on this.
upvoted 0 times
...

Save Cancel