Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSEC Topic 1 Question 15 Discussion

Actual exam question for GIAC's GIAC Security Essentials exam
Question #: 15
Topic #: 1
[All GIAC Security Essentials Questions]

Which of the following is used to allow or deny access to network resources?

Show Suggested Answer Hide Answer
Suggested Answer: B

Access control list (ACL) is a rule list containing access control entries. It is used to allow or deny access to network resources. ACL can be

implemented on network users and network devices such as routers and firewalls. Routers and firewalls use ACL to determine which packets

should be forwarded or dropped.

Answer option A is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the

IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his

identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the

responses to be misdirected.

Answer option C is incorrect. System hardening is a term used for securing an operating system. It can be achieved by installing the latest

service packs, removing unused protocols and services, and limiting the number of users with administrative privileges.

Answer option D is incorrect. Network File System (NFS) is used to configure file servers on a network, so that users can store data in a

central location. It was originally developed for the UNIX operating system to mount remote file systems and directories. The NFS software

package in Linux includes commands and daemons for NFS, Network Information Services (NIS), and other network services.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel