Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 1 Question 60 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 60
Topic #: 1
[All GSNA Questions]

You work as a Network Administrator for InfraTech Inc. You have been assigned the task of designing the firewall policy for the company. Which of the following statements can be considered acceptable in the 'contracted worker statement' portion of the firewall policy?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, D

There are different portions that can be included in the firewall policy. These portions include the acceptable use statement, the network connection statement, the contracted worker statement, and the firewall administrator statement. The contracted worker statement portion of the policy is related to the contracted or the temporary workers. It states the rights and permissions for these workers. Some of the items hat can be included in this portion are as follows:

No contractors can use FTP unless specifically granted to use it.

No contractors shall have access to TELNET unless specifically granted to use it.

No contractors shall have access to unauthorized resources.

No contractors shall have access to scan the network.

Answer A is incorrect. Only authorized resources should be accessed by the contractors.


Contribute your Thoughts:

Lucina
2 months ago
All of these options sound good to me. Might as well cover all the bases! Although, I do prefer a good old-fashioned carrier pigeon for secure file transfers. Just saying.
upvoted 0 times
...
Shaun
2 months ago
I'm going with B, C, and D. Can't be too careful with contractors, you know? Better safe than sorry when it comes to network security.
upvoted 0 times
Emeline
1 months ago
Scanning the network should definitely be off-limits for contractors.
upvoted 0 times
...
Jutta
1 months ago
I think contractors should only access FTP if they have specific permissions.
upvoted 0 times
...
Myra
1 months ago
I agree, contractors should not have access to unauthorized resources.
upvoted 0 times
...
...
Merrilee
2 months ago
I agree with Effie. Option B and D are the way to go. No need to be overly restrictive - just keep things secure and controlled.
upvoted 0 times
...
Effie
2 months ago
B and D seem like the most reasonable options. We don't want contractors scanning the network or accessing unauthorized resources, but allowing access to authorized FTP with permission makes sense.
upvoted 0 times
Arlie
1 months ago
Agreed, those options seem like the best choices to include in the firewall policy.
upvoted 0 times
...
Latosha
1 months ago
D) No contractors can access FTP unless specifically granted permissions to use it.
upvoted 0 times
...
Tegan
1 months ago
B) No contractors shall be permitted to scan the network.
upvoted 0 times
...
...
Leota
2 months ago
I think option C is not necessary as contractors should not have access to unauthorized resources anyway.
upvoted 0 times
...
Natalie
2 months ago
I agree with Adelina. Option D is also important to control access to FTP.
upvoted 0 times
...
Adelina
2 months ago
I think option A is acceptable because we need to restrict access to authorized resources.
upvoted 0 times
...

Save Cancel