New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 4 Question 10 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 10
Topic #: 4
[All GSNA Questions]

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack

tools?

Show Suggested Answer Hide Answer
Suggested Answer: D

Wireless intrusion prevention system (WIPS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use

of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator

whenever a rogue access point is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.

Rogue devices can spoof MAC address of an authorized network device as their own. WIPS uses fingerprinting approach to weed out devices

with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against

the known signatures of pre-authorized, known wireless devices.

Answer B is incorrect. An Intrusion detection system (IDS) is used to detect unauthorized attempts to access and manipulate computer

systems locally or through the Internet or an intranet. It can detect several types of attacks and malicious behaviors that can compromise the

security of a network and computers. This includes network attacks against vulnerable services, unauthorized logins and access to sensitive

data, and malware (e.g. viruses, worms, etc.). An IDS also detects attacks that originate from within a system. In most cases, an IDS has

three main components: Sensors, Console, and Engine. Sensors generate security events. A console is used to alert and control sensors and

to monitor events. An engine is used to record events and to generate security alerts based on received security events. In many IDS

implementations, these three components are combined into a single device. Basically, following two types of IDS are used :

Network-based IDS

Host-based IDS

Answer A is incorrect. Snort is an open source network intrusion prevention and detection system that operates as a network sniffer. It

logs activities of the network that is matched with the predefined signatures. Signatures can be designed for a wide range of traffic, including

Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP).

The three main modes in which Snort can be configured are as follows:

Sniffer mode: It reads the packets of the network and displays them in a continuous stream on the console.

Packet logger mode: It logs the packets to the disk.

Network intrusion detection mode: It is the most complex and configurable configuration, allowing Snort to analyze network traffic for

matches against a user-defined rule set.

Answer C is incorrect. A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against

unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic

between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.


Contribute your Thoughts:

0/2000 characters
Johnson
4 months ago
Firewalls don’t monitor the spectrum like WIPS does.
upvoted 0 times
...
Maurine
4 months ago
Surprised to see people confused about this!
upvoted 0 times
...
Desmond
4 months ago
Definitely WIPS, no doubt about it.
upvoted 0 times
...
Elfrieda
4 months ago
I thought it was IDS.
upvoted 0 times
...
Brandon
5 months ago
WIPS is the right answer!
upvoted 0 times
...
Eliseo
5 months ago
I could be wrong, but I think a firewall wouldn't monitor for rogue access points, so it has to be WIPS, right?
upvoted 0 times
...
Brittani
5 months ago
I practiced a question like this, and I feel like Snort is more for network traffic analysis, not specifically for wireless.
upvoted 0 times
...
Viva
5 months ago
I'm not entirely sure, but I remember something about IDS being more about monitoring traffic rather than the radio spectrum.
upvoted 0 times
...
Salena
5 months ago
I think WIPS is the right answer since it specifically deals with wireless intrusion prevention.
upvoted 0 times
...
Sheldon
5 months ago
Hmm, the wording about the "different date range" on the "Orders" metric is a bit confusing. I'll need to think through how that affects the values displayed in the table.
upvoted 0 times
...
Melinda
5 months ago
This question is tricky! I recall something about subpoenas being an option, but I can't remember the details.
upvoted 0 times
...
Carolann
5 months ago
I'm a bit confused by this question. I'll have to review my notes on service catalogs to see if I can figure out the correct answer.
upvoted 0 times
...
Roxanne
5 months ago
Wait, I'm a little confused now. I thought ISO 27031 was the standard for BCM readiness, but I'm not sure if that's the one that covers the full lifecycle. Maybe I should review the differences between the key BCM-related ISO standards again.
upvoted 0 times
...
Lewis
5 months ago
I'm pretty sure Wireshark is the tool that provides full packet capture from network traffic. That's the one I've used before for network analysis.
upvoted 0 times
...

Save Cancel