Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 5 Question 55 Discussion

Actual exam question for GIAC's GISF exam
Question #: 55
Topic #: 5
[All GISF Questions]

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

Show Suggested Answer Hide Answer
Suggested Answer: F

Contribute your Thoughts:

Kasandra
3 months ago
I don't think so, logging is just keeping a record of the requests.
upvoted 0 times
...
Judy
3 months ago
Haha, I bet the hackers are like 'Hey, why can't I get in anymore?' C) Shunning is the perfect solution.
upvoted 0 times
Lajuana
2 months ago
Definitely, it's like locking the door on them.
upvoted 0 times
...
Matilda
3 months ago
Yeah, shunning is a great way to keep those hackers out.
upvoted 0 times
...
...
Goldie
3 months ago
Definitely C) Shunning. Firewall blocks are the way to stop those pesky hackers in their tracks!
upvoted 0 times
...
Sabra
3 months ago
But could it also be logging the requests?
upvoted 0 times
...
Miesha
3 months ago
I think C) Shunning is the answer. Blocking that IP from accessing the network is a smart way to protect against repeated attacks.
upvoted 0 times
...
Berry
3 months ago
I agree with Kasandra, shunning makes sense in this context.
upvoted 0 times
...
Floyd
3 months ago
C) Shunning - that sounds like the right action to take against a malicious IP address. Rejecting requests from it is the way to go.
upvoted 0 times
Cathern
2 months ago
A) Sending deceptive e-mails
upvoted 0 times
...
Odette
2 months ago
C) Shunning - that sounds like the right action to take against a malicious IP address. Rejecting requests from it is the way to go.
upvoted 0 times
...
...
Kasandra
4 months ago
I think the action is known as shunning.
upvoted 0 times
...

Save Cancel