New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 1 Question 60 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 60
Topic #: 1
[All GSNA Questions]

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, D

There are different portions that can be included in the firewall policy. These portions include the acceptable use statement, the network connection statement, the contracted worker statement, and the firewall administrator statement. The contracted worker statement portion of the policy is related to the contracted or the temporary workers. It states the rights and permissions for these workers. Some of the items hat can be included in this portion are as follows:

No contractors can use FTP unless specifically granted to use it.

No contractors shall have access to TELNET unless specifically granted to use it.

No contractors shall have access to unauthorized resources.

No contractors shall have access to scan the network.

Answer A is incorrect. Only authorized resources should be accessed by the contractors.


Contribute your Thoughts:

0/2000 characters
Simona
3 months ago
D makes sense, but what if they need FTP for their work?
upvoted 0 times
...
Xuan
3 months ago
I can't believe A is even an option!
upvoted 0 times
...
Jules
3 months ago
C seems obvious, right?
upvoted 0 times
...
Ahmad
4 months ago
B and D are definitely necessary!
upvoted 0 times
...
Edna
4 months ago
A is too strict, contractors need some access.
upvoted 0 times
...
Barbra
4 months ago
I feel like option B is definitely a good choice; scanning the network could lead to security risks.
upvoted 0 times
...
Burma
4 months ago
I'm not entirely sure about option D. It seems reasonable, but what if they need FTP for legitimate reasons?
upvoted 0 times
...
Adolph
4 months ago
I remember a practice question where we discussed limiting access to unauthorized resources, so I feel like option C could be correct.
upvoted 0 times
...
Janae
5 months ago
I think option A is too strict; contractors might need some access to do their jobs, right?
upvoted 0 times
...
Mitsue
5 months ago
I feel confident about this one. The statements about restricting access for contractors and limiting specific protocols like FTP are exactly the kind of thing I'd expect to see in a firewall policy.
upvoted 0 times
...
Darrin
5 months ago
Okay, I've got this. The key is to focus on restricting access for contractors while still allowing necessary functionality. Options B and D look good to me.
upvoted 0 times
...
Moon
5 months ago
Hmm, I'm a bit unsure about this one. I need to think through the implications of each statement and make sure I understand the context.
upvoted 0 times
...
Lashunda
5 months ago
This seems like a straightforward firewall policy question. I'll carefully read through the options and select the ones that seem most appropriate.
upvoted 0 times
...
Mitsue
5 months ago
I'm a little confused by the wording of some of these statements. I'll need to double-check my understanding of firewall policies to make sure I'm selecting the right answers.
upvoted 0 times
...
Ashlyn
5 months ago
The exception handling is definitely a concern here. I'll need to make sure I understand the implications of that.
upvoted 0 times
...
Lucina
1 year ago
All of these options sound good to me. Might as well cover all the bases! Although, I do prefer a good old-fashioned carrier pigeon for secure file transfers. Just saying.
upvoted 0 times
...
Shaun
1 year ago
I'm going with B, C, and D. Can't be too careful with contractors, you know? Better safe than sorry when it comes to network security.
upvoted 0 times
Emeline
1 year ago
Scanning the network should definitely be off-limits for contractors.
upvoted 0 times
...
Jutta
1 year ago
I think contractors should only access FTP if they have specific permissions.
upvoted 0 times
...
Myra
1 year ago
I agree, contractors should not have access to unauthorized resources.
upvoted 0 times
...
...
Merrilee
1 year ago
I agree with Effie. Option B and D are the way to go. No need to be overly restrictive - just keep things secure and controlled.
upvoted 0 times
...
Effie
1 year ago
B and D seem like the most reasonable options. We don't want contractors scanning the network or accessing unauthorized resources, but allowing access to authorized FTP with permission makes sense.
upvoted 0 times
Arlie
1 year ago
Agreed, those options seem like the best choices to include in the firewall policy.
upvoted 0 times
...
Latosha
1 year ago
D) No contractors can access FTP unless specifically granted permissions to use it.
upvoted 0 times
...
Tegan
1 year ago
B) No contractors shall be permitted to scan the network.
upvoted 0 times
...
...
Leota
1 year ago
I think option C is not necessary as contractors should not have access to unauthorized resources anyway.
upvoted 0 times
...
Natalie
1 year ago
I agree with Adelina. Option D is also important to control access to FTP.
upvoted 0 times
...
Adelina
1 year ago
I think option A is acceptable because we need to restrict access to authorized resources.
upvoted 0 times
...

Save Cancel