New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 6 Question 58 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 58
Topic #: 6
[All GSNA Questions]

You are the Network Administrator for a company. You have decided to conduct a user access and rights review. Which of the following would be checked during such a review?

Each correct answer represents a part of the solution. Choose three.

Show Suggested Answer Hide Answer
Suggested Answer: D

Wireless intrusion prevention system (WIPS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use

of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator

whenever a rogue access point is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.

Rogue devices can spoof MAC address of an authorized network device as their own. WIPS uses fingerprinting approach to weed out devices

with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against

the known signatures of pre-authorized, known wireless devices.

Answer B is incorrect. An Intrusion detection system (IDS) is used to detect unauthorized attempts to access and manipulate computer

systems locally or through the Internet or an intranet. It can detect several types of attacks and malicious behaviors that can compromise the

security of a network and computers. This includes network attacks against vulnerable services, unauthorized logins and access to sensitive

data, and malware (e.g. viruses, worms, etc.). An IDS also detects attacks that originate from within a system. In most cases, an IDS has

three main components: Sensors, Console, and Engine. Sensors generate security events. A console is used to alert and control sensors and

to monitor events. An engine is used to record events and to generate security alerts based on received security events. In many IDS

implementations, these three components are combined into a single device. Basically, following two types of IDS are used :

Network-based IDS

Host-based IDS

Answer A is incorrect. Snort is an open source network intrusion prevention and detection system that operates as a network sniffer. It

logs activities of the network that is matched with the predefined signatures. Signatures can be designed for a wide range of traffic, including

Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP).

The three main modes in which Snort can be configured are as follows:

Sniffer mode: It reads the packets of the network and displays them in a continuous stream on the console.

Packet logger mode: It logs the packets to the disk.

Network intrusion detection mode: It is the most complex and configurable configuration, allowing Snort to analyze network traffic for

matches against a user-defined rule set.

Answer C is incorrect. A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against

unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic

between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.


Contribute your Thoughts:

0/2000 characters
Yan
3 months ago
I agree with all except for Firewalls, not really relevant here.
upvoted 0 times
...
Effie
3 months ago
Group Membership is super important for permissions!
upvoted 0 times
...
Louvenia
3 months ago
Wait, why would we check Encryption Methods for access rights?
upvoted 0 times
...
Xochitl
4 months ago
I think Access Control Lists should be on the list too.
upvoted 0 times
...
Alida
4 months ago
Definitely checking User Roles is a must!
upvoted 0 times
...
Olive
4 months ago
I feel like Firewalls might not be directly related to user access rights, but I could be wrong. I need to think more about this.
upvoted 0 times
...
Clement
4 months ago
User Roles and Group Membership seem crucial for this review. I practiced a similar question where those were the focus.
upvoted 0 times
...
Cassi
4 months ago
I’m not entirely sure about Encryption Methods being part of a user access review. It seems more related to data security than user rights.
upvoted 0 times
...
Ahmed
5 months ago
I remember we discussed Access Control Lists in class, so I think that’s definitely one of the checks we need to make.
upvoted 0 times
...
Rodolfo
5 months ago
This is a good opportunity to showcase my knowledge of user access management. I'll make sure to thoroughly review the access control lists, user roles, and group memberships to identify any potential issues or areas for improvement.
upvoted 0 times
...
Carey
5 months ago
I'm feeling a little lost on this one. I know access control and user roles are important, but I'm not sure how encryption and firewalls fit in. I'll make sure to read the question carefully and think through the best approach.
upvoted 0 times
...
Marleen
5 months ago
Okay, I got this. Access control, user roles, and group membership are the three main things I need to check during a user access review. Time to put my network admin skills to the test!
upvoted 0 times
...
Johna
5 months ago
Hmm, I'm a bit unsure about encryption methods and firewalls being part of this. I'll double-check the question to make sure I understand what they're looking for.
upvoted 0 times
...
Krissy
5 months ago
This looks like a straightforward access review question. I'll focus on the key areas like access control lists, user roles, and group membership.
upvoted 0 times
...
Britt
5 months ago
I think we might need to modify the vNIC Policy and the Ethernet Adapter settings since they seem related to MAC address management.
upvoted 0 times
...
Joanne
10 months ago
I bet the network admin is just using this as an excuse to finally kick Bob off the 'Meme of the Day' distribution list. Genius!
upvoted 0 times
Alexia
8 months ago
E) Group Membership
upvoted 0 times
...
Lorean
9 months ago
C) User Roles
upvoted 0 times
...
Launa
9 months ago
A) Access Control Lists
upvoted 0 times
...
...
Tatum
10 months ago
Funny Bone
upvoted 0 times
Rosendo
9 months ago
E) Group Membership
upvoted 0 times
...
Raelene
10 months ago
E) Group Membership
upvoted 0 times
...
Arlette
10 months ago
C) User Roles
upvoted 0 times
...
Shoshana
10 months ago
A) Access Control Lists
upvoted 0 times
...
Delsie
10 months ago
C) User Roles
upvoted 0 times
...
Alethea
10 months ago
A) Access Control Lists
upvoted 0 times
...
...
Bong
11 months ago
I also think Encryption Methods should be checked during the review. It's important to ensure data is protected while being transmitted or stored.
upvoted 0 times
...
Han
11 months ago
I agree with Felicidad. Access Control Lists help in controlling who can access what, User Roles define the level of access for different users, and Group Membership ensures users are assigned to the correct groups.
upvoted 0 times
...
Felicidad
11 months ago
I think during the user access and rights review, we should check Access Control Lists, User Roles, and Group Membership.
upvoted 0 times
...

Save Cancel