New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 3 Question 14 Discussion

Actual exam question for GIAC's GISP exam
Question #: 14
Topic #: 3
[All GISP Questions]

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Brice
4 months ago
Wait, are you sure it's the Data-link layer? Sounds off to me.
upvoted 0 times
...
Linwood
4 months ago
Nope, it's not the Application layer either.
upvoted 0 times
...
Shasta
4 months ago
I thought it was the Transport layer for a second!
upvoted 0 times
...
Franchesca
4 months ago
Totally agree, it's definitely not the Session layer.
upvoted 0 times
...
Belen
5 months ago
PPP works at the Data-link layer!
upvoted 0 times
...
Marla
5 months ago
I’m pretty confident that PPP is associated with the Data-link layer. It’s one of those foundational concepts we covered!
upvoted 0 times
...
Ernest
5 months ago
I’m torn between the Data-link layer and the Session layer. I wish I had reviewed that section more thoroughly.
upvoted 0 times
...
Lang
5 months ago
I remember practicing a similar question about PPP and the OSI model, and I think it’s definitely not the Application layer.
upvoted 0 times
...
Lewis
5 months ago
I think PPP operates at the Data-link layer, but I’m not completely sure.
upvoted 0 times
...
Leonard
5 months ago
I feel like I’ve seen similar questions before, and they pointed to the Data-link layer for PPP. I hope that’s right!
upvoted 0 times
...
Marjory
5 months ago
I’m a bit confused; I thought PPP might be related to the Session layer, but now I’m leaning towards Data-link.
upvoted 0 times
...
Valentine
5 months ago
I remember practicing a question about PPP in relation to the OSI model, and I think it was definitely the Data-link layer.
upvoted 0 times
...
Leonida
5 months ago
I think PPP operates at the Data-link layer, but I'm not completely sure. It could be one of the other layers too.
upvoted 0 times
...
Adelina
5 months ago
Okay, let me see if I can break this down. The key is that it's asking about mapping requirements to data elements across the business. That makes me think it's probably related to the Privacy Organization and Relationship (POR) practice area. I'll mark that as my answer for now.
upvoted 0 times
...
Celestine
5 months ago
I think I remember that Cisco Meraki devices still work even without cloud access, but I'm not sure about the exact wording of that statement.
upvoted 0 times
...
Tamesha
5 months ago
Okay, I think I've got a handle on this. The key is to identify which statements are true about how SEPS works to securely store and manage database credentials. Let me go through each option systematically.
upvoted 0 times
...
Tamesha
5 months ago
Blocking the pattern +* might sound like a valid option, but I'm questioning whether that impacts the internal dialing plans effectively.
upvoted 0 times
...
Kathrine
5 months ago
Hmm, I'm a bit unsure here. The question is asking what the CIO should do FIRST, so I'm not sure if developing a communication strategy or adopting a standardized reporting template would be the best initial step. I think I'll go with C to start.
upvoted 0 times
...
Lazaro
5 months ago
SSH is the obvious choice here. It's designed specifically for secure communications, unlike the other options which are more for general remote access or file transfers.
upvoted 0 times
...

Save Cancel