Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 8 Question 17 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 17
Topic #: 8
[All GCIH Questions]

Which of the following strategies allows a user to limit access according to unique hardware information supplied by a potential client?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Mitsue
6 months ago
Okay, that makes sense. I'll go with MAC address filtering then.
upvoted 0 times
...
Lawana
6 months ago
I think Bob and Charlie are correct. MAC addresses are unique to hardware.
upvoted 0 times
...
Mitsue
6 months ago
Really? I thought EAP might be the right option.
upvoted 0 times
...
Alease
7 months ago
I agree with MAC address filtering uses hardware info.
upvoted 0 times
...
Kathrine
7 months ago
Yeah, it's a bit confusing. But I think it's MAC address filtering.
upvoted 0 times
...
Mitsue
7 months ago
This question seems tricky. What do you think?
upvoted 0 times
...

Save Cancel