New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSLC Exam - Topic 5 Question 13 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 13
Topic #: 5
[All GSLC Questions]

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B, E

Contribute your Thoughts:

0/2000 characters
Shenika
4 months ago
Strong passwords are key, but not a wireless security step!
upvoted 0 times
...
Ona
4 months ago
Wait, not broadcasting SSID? Does that really help?
upvoted 0 times
...
Chantell
4 months ago
Hardening the server OS is crucial, though!
upvoted 0 times
...
Julio
4 months ago
Totally agree, MAC filtering isn't foolproof either.
upvoted 0 times
...
Celeste
5 months ago
WEP is outdated, better use WPA3!
upvoted 0 times
...
Rodolfo
5 months ago
Strong password policies on workstations seem unrelated to the wireless connection itself, but I could be wrong about that.
upvoted 0 times
...
Audria
5 months ago
MAC filtering sounds familiar, but I’m not entirely sure if it’s a foolproof method for securing wireless connections.
upvoted 0 times
...
Alishia
5 months ago
I think hardening the server OS is more about protecting the server itself rather than the wireless network, right?
upvoted 0 times
...
Emmett
5 months ago
I remember we discussed that WEP and WPA are encryption methods, but I’m not sure if they’re considered secure enough anymore.
upvoted 0 times
...
Huey
5 months ago
Strong password policies on workstations seem unrelated to wireless security, but I can't quite recall if that's definitely one of the options we should choose.
upvoted 0 times
...
Alba
5 months ago
I practiced a similar question about wireless security last week, and I think MAC filtering is a common method, so it might not be one of the correct answers here.
upvoted 0 times
...
Tomas
5 months ago
I'm a bit unsure, but I feel like hardening the server OS is more about securing the server itself rather than the wireless connection.
upvoted 0 times
...
Nickolas
5 months ago
I remember discussing WEP and WPA in class, and I think using them is definitely a step in securing wireless networks, so that might not be one of the answers.
upvoted 0 times
...
Lashandra
5 months ago
This looks like a tricky question that requires a good understanding of IT cost modeling and service portfolio management. I'll need to carefully review the scenario and options to determine the best approach.
upvoted 0 times
...
Rima
5 months ago
Wait, what's the difference between 1U2S and 2U2S? I'm a little confused on the specifics of these configurations. I'll have to double-check my notes to make sure I understand.
upvoted 0 times
...
Jovita
5 months ago
Okay, I've got this. The standard local route group is configured under Call Routing > Route/Hunt > Local Route Group Names. That's the correct answer.
upvoted 0 times
...
Tomoko
5 months ago
administrator@activiti.com: The question specifies the "activiti-app" application, so the admin username is likely in the format of "administrator@activiti.com". That's my best guess.
upvoted 0 times
...

Save Cancel