New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 1 Question 9 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 9
Topic #: 1
[All GSNA Questions]

You work as a Network Administrator for ABC Inc. The company needs a secured wireless network. To provide network security to the company, you are required to configure a device that provides the best network perimeter security. Which of the following devices would you use to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: C

Packet filtering firewalls work on the first three layers of the OSI reference model, which means all the work is done between the network and

physical layers. When a packet originates from the sender and filters through a firewall, the device checks for matches to any of the packet

filtering rules that are configured in the firewall and drops or rejects the packet accordingly. In a software firewall, packet filtering is done by a

program called a packet filter. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides

to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). A packet filter passes or blocks packets at a network interface

based on source and destination addresses, ports, or protocols. The process is used in conjunction with packet mangling and Network

Address Translation (NAT). Packet filtering is often part of a firewall program for protecting a local network from unwanted intrusion. This type

of firewall can be best used for network perimeter security.

Answer B is incorrect. An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at

accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the

form of attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly

encrypted traffic. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and

trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks

such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).

Answer A is incorrect. A proxy server exists between a client's Web-browsing program and a real Internet server. The purpose of the

proxy server is to enhance the performance of user requests and filter requests. A proxy server has a database called cache where the most

frequently accessed Web pages are stored. The next time such pages are requested, the proxy server is able to suffice the request locally,

thereby greatly reducing the access time. Only when a proxy server is unable to fulfill a request locally does it forward the request to a real

Internet server. The proxy server can also be used for filtering user requests. This may be done in order to prevent the users from visiting

non-genuine sites.

Answer D is incorrect. A honeypot is a term in computer terminology used for a trap that is set to detect, deflect, or in some manner

counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to

be part of a network, but is actually isolated, and monitored, and which seems to contain information or a resource of value to attackers.


Contribute your Thoughts:

0/2000 characters
Haley
4 months ago
IDS is cool, but it’s more for monitoring than securing the perimeter.
upvoted 0 times
...
Gilberto
4 months ago
Proxy servers can help too, but not as a primary defense.
upvoted 0 times
...
Leontine
4 months ago
Wait, a honeypot? Isn't that more for deception than security?
upvoted 0 times
...
Cherrie
4 months ago
Totally agree, firewalls are essential!
upvoted 0 times
...
Emilio
5 months ago
I'd go with a packet filtering firewall for perimeter security.
upvoted 0 times
...
Sylvia
5 months ago
I thought honeypots were more for deception and not really for securing the network perimeter. I’m leaning towards the packet filtering firewall, but I need to double-check my notes.
upvoted 0 times
...
Anabel
5 months ago
I’m a bit confused about the difference between IDS and a packet filtering firewall. I feel like both could play a role, but which one is more effective at the perimeter?
upvoted 0 times
...
Gertude
5 months ago
I remember practicing a question similar to this, and I think a proxy server could also help with security, but it might not be the primary device for perimeter defense.
upvoted 0 times
...
Anika
5 months ago
I think a packet filtering firewall might be the right choice for perimeter security, but I'm not entirely sure if it's the best option for a wireless network.
upvoted 0 times
...
Angella
5 months ago
Hmm, I think statement 1 is correct since bonuses can impact the overall control environment. But I'm not sure about the other statements - I'll need to think this through carefully.
upvoted 0 times
...
Sina
5 months ago
I'm leaning towards the student response system as well. It seems like the best way to get a quick snapshot of how well the class grasped the key points from the video-conference. The other options seem a bit too involved for a quick assessment.
upvoted 0 times
...
Elli
5 months ago
This is a tricky one. There are a few different Salesforce solutions mentioned, and it's not entirely clear which one would be the best fit. I'm a bit confused, to be honest. I might need to review the material again and think through the pros and cons of each option more carefully.
upvoted 0 times
...

Save Cancel