New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSLC Exam - Topic 2 Question 31 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 31
Topic #: 2
[All GSLC Questions]

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Alesia
3 months ago
Firewalls (D) are good, but they won't encrypt the data like SSL does.
upvoted 0 times
...
Hildegarde
3 months ago
Wait, can SSL really protect against sniffing attacks? Seems too simple.
upvoted 0 times
...
Katina
4 months ago
A is the best option here, no doubt!
upvoted 0 times
...
Adria
4 months ago
I think a proxy server (B) could help too, right?
upvoted 0 times
...
Tommy
4 months ago
Definitely go with A, SSL is the way to secure SMTP.
upvoted 0 times
...
Carline
4 months ago
I feel like a firewall wouldn't directly protect against sniffing attacks on SMTP, but I might be mixing up concepts.
upvoted 0 times
...
Meghann
4 months ago
EFS sounds familiar, but I thought it was more for file encryption rather than securing email protocols.
upvoted 0 times
...
Kandis
5 months ago
I think using a proxy server could help, but I don't recall it specifically addressing sniffing attacks on SMTP.
upvoted 0 times
...
Ora
5 months ago
I remember something about SSL certificates being used to secure email transmissions, but I'm not entirely sure if that's the right answer here.
upvoted 0 times
...
Haydee
5 months ago
Okay, let me break this down. The key is understanding the different levels of deficiencies - all deficiencies must be communicated to management, but only significant deficiencies and material weaknesses need to be reported to the audit committee or board. I think option B is the best answer, but I'll double-check the details.
upvoted 0 times
...
Emiko
5 months ago
I've got this one! The attributes of a managed CI would include things like the name, version, location, owner, and other key details about the configuration item itself. Incidents, known errors, and RFCs are more about the management process, not the CI attributes.
upvoted 0 times
...

Save Cancel