New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 5 Question 41 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 41
Topic #: 5
[All GSNA Questions]

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Show Suggested Answer Hide Answer
Suggested Answer: D

In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.

Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.

Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.

Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each

there has been.


Contribute your Thoughts:

0/2000 characters
Fairy
3 months ago
Not sure if site surveys are enough, what about ongoing monitoring?
upvoted 0 times
...
Charlena
3 months ago
Totally agree, site surveys can catch rogue APs easily.
upvoted 0 times
...
Lucina
3 months ago
Surprised that anti-virus software is even an option here!
upvoted 0 times
...
Beatriz
4 months ago
I think protocol analyzers are more effective for this.
upvoted 0 times
...
Royce
4 months ago
Site surveys are definitely the way to go!
upvoted 0 times
...
Meaghan
4 months ago
I vaguely remember that protocol analyzers can help identify unusual traffic, but I'm not confident if that's enough to prevent rogue access points.
upvoted 0 times
...
Gerald
4 months ago
I feel like network anti-virus software wouldn't really help with rogue access points, but I can't remember why.
upvoted 0 times
...
Suzi
4 months ago
I think site surveys might be the most effective way to detect unauthorized access points, but I can't recall the exact process we practiced.
upvoted 0 times
...
Marleen
5 months ago
I remember we discussed how rogue access points can be a big security risk, but I'm not sure if protocol analyzers are the best option here.
upvoted 0 times
...
German
5 months ago
Site surveys could be a good way to physically locate any rogue access points. I'll make sure to consider all the options carefully.
upvoted 0 times
...
Dorathy
5 months ago
Network anti-spyware software sounds like the most straightforward option to me. I'll make sure to explain my reasoning in the exam.
upvoted 0 times
...
Candida
5 months ago
Ah, I've seen this type of question before. I think protocol analyzers would be the best way to detect and prevent rogue wireless access points.
upvoted 0 times
...
Margarett
5 months ago
Hmm, I'm a bit unsure about this. I'll need to review my notes on network security to figure out the right solution.
upvoted 0 times
...
Carma
5 months ago
This seems like a tricky one. I'll need to think carefully about the best approach to detect and prevent rogue wireless access points.
upvoted 0 times
...
Alona
5 months ago
This question seems straightforward - it's asking about the relationship between automation and risk level for mission-critical versus non-critical systems. I think I can reason through this one.
upvoted 0 times
...
Rebbeca
5 months ago
Ah, I've seen questions like this before. I think the key is to understand how multicast traffic is handled in an MVPN environment. Let me think this through step-by-step.
upvoted 0 times
...
Shelton
5 months ago
Okay, this is a classic enterprise architecture scenario. The CIO has given us the green light, but we need to ensure the solution aligns with the company's standards and guidelines. I think option C is the way to go - eliminate the non-standard web server, create a revised plan, and work closely with the finance team to understand the long-term cost benefits.
upvoted 0 times
...
Zena
5 months ago
I'm a bit confused about the "Monochromatic Palette 6" part. I'll need to double-check what that means before attempting this.
upvoted 0 times
...
Whitley
5 months ago
Okay, I think I got this. The key is that XML canonicalization ensures the XML document is in a standardized format before it's digitally signed. That way, the message digest will match when the signature is verified, even if the original document had slight syntax differences. I'll go with True on this one.
upvoted 0 times
...
Louvenia
5 months ago
Hmm, I'm a bit unsure about this one. I'll have to think it through carefully.
upvoted 0 times
...
Mozell
9 months ago
I bet the person who wrote this question is still using a rotary phone. Site surveys are the only way to go if you want to keep those rogue APs at bay!
upvoted 0 times
...
Dyan
9 months ago
B) Network anti-virus software? What is this, the 90s? Rogue APs are way more sophisticated than that. Get with the times, people!
upvoted 0 times
Eveline
8 months ago
D) Site surveys
upvoted 0 times
...
Judy
9 months ago
C) Protocol analyzers
upvoted 0 times
...
Phillip
9 months ago
A) Network anti-spyware software
upvoted 0 times
...
...
Willard
9 months ago
A) Network anti-spyware software? Really? That's like using a flyswatter to catch a bull. Wireless security requires a more targeted approach.
upvoted 0 times
...
Cristen
9 months ago
C) Protocol analyzers would also be a good choice to monitor network traffic and identify any suspicious activity from rogue access points.
upvoted 0 times
Kirk
9 months ago
D) Site surveys can also help in detecting unauthorized access points on the network.
upvoted 0 times
...
Tom
9 months ago
C) Protocol analyzers are great for monitoring network traffic and identifying any suspicious activity.
upvoted 0 times
...
Tayna
9 months ago
A) Network anti-spyware software can help detect and prevent rogue access points.
upvoted 0 times
...
...
Lizette
10 months ago
D) Site surveys seems like the best option to detect and prevent rogue wireless access points. You can physically inspect the network to identify any unauthorized devices.
upvoted 0 times
Paola
8 months ago
D) Site surveys seems like the best option to detect and prevent rogue wireless access points. You can physically inspect the network to identify any unauthorized devices.
upvoted 0 times
...
Salome
9 months ago
C) Protocol analyzers
upvoted 0 times
...
Gearldine
9 months ago
A) Network anti-spyware software
upvoted 0 times
...
...
Lorean
10 months ago
I personally prefer site surveys to detect and prevent rogue access points.
upvoted 0 times
...
Lucina
11 months ago
I agree with Hoa, protocol analyzers can help detect rogue access points.
upvoted 0 times
...
Hoa
11 months ago
I think the best way is to use protocol analyzers.
upvoted 0 times
...

Save Cancel