Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 7 Question 33 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 33
Topic #: 7
[All GCIH Questions]

Which of the following strategies allows a user to limit access according to unique hardware information supplied by a potential client?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Rozella
1 months ago
MAC address filtering? That's like using a spoon to plug a hole in the Titanic. Sure, it might work for a little while, but when the water comes rushing in, you're toast.
upvoted 0 times
...
Dawne
1 months ago
Ah, the good old MAC address filtering. It's like trying to keep a herd of cats in a cardboard box - you can try, but it's not gonna work out well.
upvoted 0 times
Bettina
14 days ago
Yeah, it can be a bit of a headache trying to keep track of all the different addresses.
upvoted 0 times
...
Pete
16 days ago
MAC address filtering can be a hassle to manage.
upvoted 0 times
...
...
Youlanda
2 months ago
I'm not sure, but I think A) Extensible Authentication Protocol could also be a valid strategy for limiting access.
upvoted 0 times
...
Helaine
2 months ago
MAC address filtering? Psh, that's about as secure as a paper bag. Might as well just leave the door wide open and let anyone waltz in!
upvoted 0 times
Jackie
16 days ago
A) Extensible Authentication Protocol (EAP)
upvoted 0 times
...
Douglass
20 days ago
C) MAC address filtering? Yeah, it's not the most secure option out there.
upvoted 0 times
...
Chau
23 days ago
C) MAC address filtering
upvoted 0 times
...
Dorothy
27 days ago
A) Extensible Authentication Protocol (EAP)
upvoted 0 times
...
...
Na
2 months ago
C'mon, MAC address filtering? That's so last decade! We need something more cutting-edge, like biometric fingerprint scanning to unlock the Wi-Fi, am I right?
upvoted 0 times
Annett
1 months ago
D) Wireless Transport Layer Security (WTLS)
upvoted 0 times
...
Veda
1 months ago
C) MAC address filtering
upvoted 0 times
...
Providencia
1 months ago
B) WEP
upvoted 0 times
...
Ronald
2 months ago
A) Extensible Authentication Protocol (EAP)
upvoted 0 times
...
...
Carry
2 months ago
I agree with Freeman. MAC address filtering allows limiting access based on unique hardware information.
upvoted 0 times
...
Freeman
2 months ago
I think the answer is C) MAC address filtering.
upvoted 0 times
...

Save Cancel