New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 3 Question 11 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 11
Topic #: 3
[All GSNA Questions]

You work as an IT Technician for uCertify Inc. You have to take security measures for the wireless network of the company. You want to prevent other computers from accessing the company's wireless network. On the basis of the hardware address, which of the following will you use as the best possible method to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: B

MAC filtering is a security access control technique that allows specific network devices to access, or prevents them from accessing, the network. MAC filtering can also be used on a wireless network to prevent certain network devices from accessing the wireless network. MAC addresses are allocated only to hardware devices, not to persons.


Contribute your Thoughts:

0/2000 characters
Angelyn
4 months ago
MAC Filtering is solid, but you should combine it with other measures too.
upvoted 0 times
...
Johana
4 months ago
WEP is outdated, don't even consider it!
upvoted 0 times
...
Donette
4 months ago
Wait, isn't MAC Filtering easy to spoof? Not sure it's foolproof.
upvoted 0 times
...
Glory
4 months ago
I disagree, SSID hiding is also a good option.
upvoted 0 times
...
Dalene
5 months ago
Definitely go with MAC Filtering! It's the best way to control access.
upvoted 0 times
...
Malissa
5 months ago
I feel like RAS might be related to remote access, but I don't think it's the best method for securing a wireless network.
upvoted 0 times
...
Elbert
5 months ago
I practiced a question similar to this, and I believe WEP is outdated and not secure enough for this purpose.
upvoted 0 times
...
Tawna
5 months ago
I'm not entirely sure, but I remember something about SSID being more about network visibility than access control.
upvoted 0 times
...
Denna
5 months ago
I think MAC Filtering is the right choice here since it allows you to specify which devices can connect based on their hardware addresses.
upvoted 0 times
...
Renea
5 months ago
This seems like a classic web service security question. I'll apply the principles I learned about different types of web service attacks to determine the correct answer.
upvoted 0 times
...
Audra
5 months ago
This looks like a straightforward question about access control systems. I'll start by reviewing the key terms in the question to make sure I understand the context.
upvoted 0 times
...
Clarence
5 months ago
I'm a bit confused on the difference between configuring Managed Servers and starting them using Node Manager. I'll need to review my notes on those WLST functions to make sure I understand the distinction.
upvoted 0 times
...
Tambra
5 months ago
This question seems straightforward, but I'll need to think through the regulatory implications of each option carefully.
upvoted 0 times
...
Trinidad
5 months ago
Hmm, I'm not too sure about this one. I'm trying to remember what the minimum components are for a template imported by Oracle VM Manager. Let me think this through carefully.
upvoted 0 times
...

Save Cancel