New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GPEN Exam - Topic 3 Question 33 Discussion

Actual exam question for GIAC's GPEN exam
Question #: 33
Topic #: 3
[All GPEN Questions]

Which of the following does NOT use a proxy software to protect users?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Donte
3 months ago
Circuit level proxy servers are proxies, so D is out!
upvoted 0 times
...
An
3 months ago
B is definitely not a proxy, just a basic firewall.
upvoted 0 times
...
Francene
4 months ago
Wait, I thought application layer gateways used proxies?
upvoted 0 times
...
Elinore
4 months ago
Totally agree, packet filtering is also not a proxy.
upvoted 0 times
...
Junita
4 months ago
A is correct, stateful inspection doesn't use proxy software.
upvoted 0 times
...
Dorothea
4 months ago
I practiced a question like this before, and I think stateful inspection is the right answer since it focuses on the state of connections rather than acting as a proxy.
upvoted 0 times
...
Lilli
4 months ago
Application layer gateways definitely use proxies, but I can't recall if circuit level proxy servers do too.
upvoted 0 times
...
Florinda
5 months ago
I remember packet filtering is more about checking headers, so it might not involve proxies either.
upvoted 0 times
...
Kimi
5 months ago
I think stateful inspection doesn't use proxy software, but I'm not entirely sure. It seems more about tracking connections.
upvoted 0 times
...
Justine
5 months ago
I'm a bit confused by the options here. Are we looking for two different ways to set up the automation, or is it just one way with two parts?
upvoted 0 times
...
Madonna
5 months ago
Ah, I see what they're asking. I think options B and D are the correct answers here. Importing the module and then calling the function, or directly importing the function and calling it - those both seem like valid ways to invoke the function.
upvoted 0 times
...
Tijuana
5 months ago
Okay, I'll first calculate the total points from all referrals. 350 standard referrals at 1 point, 100 complicated referrals at 1.5 points.
upvoted 0 times
...
Roxane
5 months ago
Okay, I think I've got this. The key is ensuring the algorithm doesn't have a disparate impact on protected classes, regardless of whether it uses information about those classes directly or indirectly. I'll focus on that in my answer.
upvoted 0 times
...
Lenna
5 months ago
Hmm, this seems like a tricky one. I'll need to think it through carefully.
upvoted 0 times
...

Save Cancel