New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 1 Question 15 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 15
Topic #: 1
[All GSEC Questions]

Which of the following is used to allow or deny access to network resources?

Show Suggested Answer Hide Answer
Suggested Answer: B

Access control list (ACL) is a rule list containing access control entries. It is used to allow or deny access to network resources. ACL can be

implemented on network users and network devices such as routers and firewalls. Routers and firewalls use ACL to determine which packets

should be forwarded or dropped.

Answer option A is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the

IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his

identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the

responses to be misdirected.

Answer option C is incorrect. System hardening is a term used for securing an operating system. It can be achieved by installing the latest

service packs, removing unused protocols and services, and limiting the number of users with administrative privileges.

Answer option D is incorrect. Network File System (NFS) is used to configure file servers on a network, so that users can store data in a

central location. It was originally developed for the UNIX operating system to mount remote file systems and directories. The NFS software

package in Linux includes commands and daemons for NFS, Network Information Services (NIS), and other network services.


Contribute your Thoughts:

0/2000 characters
Fanny
4 months ago
NFS? Really? That seems off.
upvoted 0 times
...
Edda
4 months ago
100% agree, ACL is the way to go!
upvoted 0 times
...
Anika
4 months ago
Wait, can spoofing really control access?
upvoted 0 times
...
James
4 months ago
I thought it was system hardening!
upvoted 0 times
...
Arthur
5 months ago
ACL is definitely the right answer.
upvoted 0 times
...
Hubert
5 months ago
Spoofing sounds familiar, but I can't recall it being used for access control. It seems more about deception.
upvoted 0 times
...
Emmett
5 months ago
I remember studying about system hardening, but I don’t think it directly controls access like ACL does.
upvoted 0 times
...
Delfina
5 months ago
I think ACL stands for Access Control List, and it’s definitely related to managing access, but I’m not 100% sure if it’s the only option here.
upvoted 0 times
...
Ethan
5 months ago
I feel like I’ve seen practice questions where ACL was the right answer for access management. I’m leaning towards that.
upvoted 0 times
...
Louann
5 months ago
Okay, let's see. When the BGP link goes down, it tears down the entire BGP session and all the routes associated with it. That sounds like a good example of fate sharing to me.
upvoted 0 times
...
Dusti
5 months ago
I think option D is the most likely culprit here. The description of the problem matches what I know about asynchronous destaging causing performance issues, even when other system resources seem fine.
upvoted 0 times
...
Isaiah
5 months ago
I think this question is testing our understanding of IGMP version 2 and how the last hop router handles a leave message. I'll need to carefully review the options and think through the expected behavior.
upvoted 0 times
...

Save Cancel