New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GISP Exam - Topic 5 Question 42 Discussion

Actual exam question for GIAC's GISP exam
Question #: 42
Topic #: 5
[All GISP Questions]

Which of the following are tunneling protocols?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Kerry
3 months ago
NNTP is for newsgroups, not tunneling.
upvoted 0 times
...
Lavelle
3 months ago
Wait, are we sure about PPTP? Seems outdated.
upvoted 0 times
...
Ollie
3 months ago
Totally agree, L2TP and PPTP are the right answers!
upvoted 0 times
...
Martina
4 months ago
I thought SMTP was a tunneling protocol too?
upvoted 0 times
...
Winfred
4 months ago
L2TP and PPTP are definitely tunneling protocols.
upvoted 0 times
...
Nu
4 months ago
I think I read that PPTP is a tunneling protocol, but I might be mixing it up with something else.
upvoted 0 times
...
Fernanda
4 months ago
I feel like L2TP is definitely one of them, but I can't recall if PPTP is the other or if it's something else.
upvoted 0 times
...
Cecil
4 months ago
I remember practicing a question like this, and I think SMTP and NNTP are more about email and news, not tunneling.
upvoted 0 times
...
Whitney
5 months ago
I think L2TP and PPTP are the tunneling protocols, but I'm not completely sure about the details of each.
upvoted 0 times
...
Mari
5 months ago
I'm a bit confused on the difference between tunneling protocols and other network protocols. I'll have to review my notes to make sure I understand this properly before answering.
upvoted 0 times
...
Shawana
5 months ago
Hmm, I'm not too sure about this. I know SMTP and NNTP are email and news protocols, but I can't remember if they're considered tunneling protocols. I'll have to think this through a bit more.
upvoted 0 times
...
Justine
5 months ago
I'm pretty confident about this one. L2TP and PPTP are definitely tunneling protocols, so I'll select those.
upvoted 0 times
...
Starr
5 months ago
Okay, I remember learning about L2TP and PPTP in class as VPN tunneling protocols. Those are the two I'll select for this question.
upvoted 0 times
...
Genevieve
5 months ago
Hmm, I'm a bit confused. The question mentions the "deletion strategy" is set to "Mark as absent", but I'm not sure how that relates to the different options. I'll need to re-read this a few times to make sure I understand.
upvoted 0 times
...
Hobert
5 months ago
I'm a bit unsure about this one. Is it possible to add a user to an investigation using the # symbol or the @ symbol? I'll have to think this through carefully.
upvoted 0 times
...
Gerald
5 months ago
The social media aspect caught my eye. I wonder if that could be the factor that's not relevant here. Since the question is about establishing a privacy baseline, their content sharing practices on social media might not be as crucial as their internal data handling and compliance efforts.
upvoted 0 times
...
Eloisa
5 months ago
The single quotes and escaping the spaces seem like the way to go here. I'll mark those two options.
upvoted 0 times
...
Joanna
5 months ago
I've got this! Cross-site Scripting is when an attacker tries to execute malicious scripts in a user's web browser, while SQL Injection is when they try to exploit vulnerabilities in the database to gain unauthorized access or control. Knowing the difference is crucial for identifying and preventing these types of attacks.
upvoted 0 times
...
Micaela
10 months ago
L2TP and PPTP, no doubt. Those are the tunneling protocols I use to access the secret underground lair. Can't be too careful these days!
upvoted 0 times
Helene
9 months ago
It's important to use secure protocols like L2TP and PPTP for sensitive access like that.
upvoted 0 times
...
Cristen
9 months ago
Using those protocols must make you feel secure accessing the secret underground lair.
upvoted 0 times
...
Sang
10 months ago
I agree, L2TP and PPTP are definitely tunneling protocols.
upvoted 0 times
...
...
Rosalind
10 months ago
Haha, SMTP for tunneling? That's like using a carrier pigeon to send encrypted messages. I'll go with C) L2TP and D) PPTP.
upvoted 0 times
Ora
8 months ago
Good choice with L2TP and PPTP.
upvoted 0 times
...
Twila
8 months ago
Using carrier pigeons for encryption would be interesting.
upvoted 0 times
...
Nelida
9 months ago
L2TP and PPTP are the correct tunneling protocols.
upvoted 0 times
...
Fallon
10 months ago
I agree, SMTP is definitely not a tunneling protocol.
upvoted 0 times
...
...
Tamra
10 months ago
Definitely C) L2TP and D) PPTP. Those are the classic VPN tunneling protocols, perfect for securely accessing remote networks.
upvoted 0 times
...
Anisha
10 months ago
I think C) L2TP and D) PPTP are the correct answers. Tunneling protocols create secure connections, unlike SMTP and NNTP.
upvoted 0 times
Fannie
9 months ago
Yes, SMTP and NNTP are not tunneling protocols like L2TP and PPTP.
upvoted 0 times
...
Nakita
9 months ago
I agree, C) L2TP and D) PPTP are tunneling protocols.
upvoted 0 times
...
...
Ty
11 months ago
I'm not sure about this one, but I think SMTP and NNTP are tunneling protocols.
upvoted 0 times
...
Yolande
11 months ago
I agree with Lauran, L2TP and PPTP are tunneling protocols.
upvoted 0 times
...
Lauran
11 months ago
I think the tunneling protocols are L2TP and PPTP.
upvoted 0 times
...

Save Cancel