New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 5 Question 49 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 49
Topic #: 5
[All GSNA Questions]

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

Show Suggested Answer Hide Answer
Suggested Answer: D

In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.

Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.

Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.

Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each

there has been.


Contribute your Thoughts:

0/2000 characters
Salley
3 months ago
I’m not convinced this is a huge risk, seems like overkill to worry about it.
upvoted 0 times
...
Mireya
3 months ago
Slowing down the network is a concern too, but security is priority!
upvoted 0 times
...
Herschel
3 months ago
Wait, are we really saying this isn't a big deal?
upvoted 0 times
...
Melissia
4 months ago
I agree, it totally circumvents network intrusion detection.
upvoted 0 times
...
Leota
4 months ago
Definitely a security risk, unauthorized WAPs can be a hacker's gateway.
upvoted 0 times
...
Eden
4 months ago
I studied that unauthorized access points can be a major risk for hackers, so I lean towards D being the best answer.
upvoted 0 times
...
Cyndy
4 months ago
I feel like this situation could definitely bypass some security measures, so C might be relevant here as well.
upvoted 0 times
...
Francoise
4 months ago
I'm not entirely sure, but I think B could be a concern too since it might affect performance.
upvoted 0 times
...
Cordie
5 months ago
I remember discussing how unauthorized devices can create vulnerabilities in the network. It seems like D might be the right choice.
upvoted 0 times
...
Bong
5 months ago
I think option C is the best answer. Bypassing the network's intrusion detection system is a major security concern that could expose the company to all kinds of threats.
upvoted 0 times
...
Elizabeth
5 months ago
Definitely option D. An unauthorized wireless access point is a huge security vulnerability that could let hackers into the network. The web developer should have gone through the proper approval process.
upvoted 0 times
...
Clare
5 months ago
I'm a bit unsure about this one. Isn't adding a wireless access point a common task for web developers? I'm not sure if it's really a security risk.
upvoted 0 times
...
Graham
5 months ago
This seems like a straightforward security risk. The unauthorized wireless access point could allow hackers to bypass the company's network security measures.
upvoted 0 times
...
Cristy
5 months ago
No problem, I've got this. SSL Outbound Proxy, SSHv2 Proxy, and SSL Inbound Inspection - those are the three I'm confident are the correct answers here.
upvoted 0 times
...
Kiley
5 months ago
Okay, let's see. Since high availability is not a concern, I don't think multipathing is required. I'll focus on the other options and try to eliminate the incorrect ones.
upvoted 0 times
...
Pearlene
5 months ago
Hmm, this seems like a tricky one. I'll need to think it through carefully.
upvoted 0 times
...
Wilson
5 months ago
Hmm, I'm a bit unsure about this one. I know blockchain has something to do with security and decentralization, but I'm not totally clear on how that applies to voting. I'll need to think it through carefully.
upvoted 0 times
...
Kandis
10 months ago
Seriously, who does this web developer think he is? MacGyver? D is the obvious choice here. Unauthorized access points are like open doors for hackers – they just can't resist the temptation.
upvoted 0 times
Argelia
8 months ago
D) An unauthorized WAP is one way for hackers to get into a network.
upvoted 0 times
...
Carey
9 months ago
B) It is likely to increase network traffic and slow down network performance.
upvoted 0 times
...
Lawrence
9 months ago
A) None, adding a wireless access point is a common task and not a security risk.
upvoted 0 times
...
...
Valentin
10 months ago
B is a good guess, but C is the real winner here. An unauthorized WAP can circumvent the network's intrusion detection, making it a prime target for cyber-attacks. This is no laughing matter, folks.
upvoted 0 times
Lezlie
8 months ago
D) An unauthorized WAP is one way for hackers to get into a network.
upvoted 0 times
...
Kallie
9 months ago
C) This circumvents network intrusion detection.
upvoted 0 times
...
Valene
9 months ago
B) It is likely to increase network traffic and slow down network performance.
upvoted 0 times
...
Helene
9 months ago
A) None, adding a wireless access point is a common task and not a security risk.
upvoted 0 times
...
...
Yolando
10 months ago
Oh, come on! Adding a wireless router is just a minor inconvenience. What could possibly go wrong? It's not like hackers are lurking around every corner, waiting to pounce on our network. *wink wink*
upvoted 0 times
Torie
9 months ago
D) An unauthorized WAP is one way for hackers to get into a network.
upvoted 0 times
...
Terrilyn
9 months ago
A) None, adding a wireless access point is a common task and not a security risk.
upvoted 0 times
...
...
Billye
10 months ago
We should definitely address this issue with the Web developer and remove the unauthorized WAP to prevent any security breaches.
upvoted 0 times
...
Dorathy
10 months ago
I think the correct answer is D. An unauthorized WAP can be a huge security risk, as it allows hackers to bypass the network's security measures and gain access to sensitive data.
upvoted 0 times
...
Maia
11 months ago
I agree with Angelica. Hackers could easily access our network through an unauthorized WAP.
upvoted 0 times
...
Angelica
11 months ago
I think option D is the correct answer. Unauthorized WAPs can be a security risk.
upvoted 0 times
...

Save Cancel