Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 6 Question 58 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 58
Topic #: 6
[All GSNA Questions]

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack

tools?

Show Suggested Answer Hide Answer
Suggested Answer: D

Wireless intrusion prevention system (WIPS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use

of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator

whenever a rogue access point is detected. Conventionally it is achieved by comparing the MAC address of the participating wireless devices.

Rogue devices can spoof MAC address of an authorized network device as their own. WIPS uses fingerprinting approach to weed out devices

with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against

the known signatures of pre-authorized, known wireless devices.

Answer B is incorrect. An Intrusion detection system (IDS) is used to detect unauthorized attempts to access and manipulate computer

systems locally or through the Internet or an intranet. It can detect several types of attacks and malicious behaviors that can compromise the

security of a network and computers. This includes network attacks against vulnerable services, unauthorized logins and access to sensitive

data, and malware (e.g. viruses, worms, etc.). An IDS also detects attacks that originate from within a system. In most cases, an IDS has

three main components: Sensors, Console, and Engine. Sensors generate security events. A console is used to alert and control sensors and

to monitor events. An engine is used to record events and to generate security alerts based on received security events. In many IDS

implementations, these three components are combined into a single device. Basically, following two types of IDS are used :

Network-based IDS

Host-based IDS

Answer A is incorrect. Snort is an open source network intrusion prevention and detection system that operates as a network sniffer. It

logs activities of the network that is matched with the predefined signatures. Signatures can be designed for a wide range of traffic, including

Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP).

The three main modes in which Snort can be configured are as follows:

Sniffer mode: It reads the packets of the network and displays them in a continuous stream on the console.

Packet logger mode: It logs the packets to the disk.

Network intrusion detection mode: It is the most complex and configurable configuration, allowing Snort to analyze network traffic for

matches against a user-defined rule set.

Answer C is incorrect. A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against

unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic

between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.


Contribute your Thoughts:

Becky
2 months ago
D) WIPS? More like 'Wireless Intrusion Protection Superhero'! That's the tool you want to keep your network safe from those pesky rogue APs.
upvoted 0 times
Lea
2 months ago
C) Firewall is important for blocking unauthorized access.
upvoted 0 times
...
Lili
2 months ago
D) WIPS is like a superhero for protecting your wireless network.
upvoted 0 times
...
Elke
2 months ago
B) IDS stands for Intrusion Detection System.
upvoted 0 times
...
Yuette
2 months ago
A) Snort is great for detecting network intrusions.
upvoted 0 times
...
...
Vesta
2 months ago
D) WIPS all the way! It's like having a wireless superhero on your side, keeping an eye on the airwaves for any suspicious activity.
upvoted 0 times
Lynsey
1 months ago
WIPS sounds like a powerful tool for keeping our network secure from wireless attacks.
upvoted 0 times
...
Ulysses
2 months ago
I agree, having a wireless superhero on your side is crucial for detecting unauthorized access points.
upvoted 0 times
...
Edward
2 months ago
WIPS is definitely the way to go for monitoring the radio spectrum.
upvoted 0 times
...
...
Glendora
3 months ago
C) Firewall? Really? That's for controlling the flow of network traffic, not detecting rogue access points. D) WIPS is the obvious choice.
upvoted 0 times
...
Lettie
3 months ago
B) IDS? Seriously? That's for monitoring network traffic, not the radio spectrum. D) WIPS is clearly the way to go here.
upvoted 0 times
Leatha
1 months ago
D) WIPS is the tool that monitors the radio spectrum for unauthorized access points.
upvoted 0 times
...
Vivan
2 months ago
C) Firewall is not designed for monitoring the radio spectrum.
upvoted 0 times
...
Peggie
2 months ago
B) IDS is not the correct choice for this scenario.
upvoted 0 times
...
James
2 months ago
A) Snort is not the right tool for monitoring the radio spectrum.
upvoted 0 times
...
...
Pamela
3 months ago
I'm not sure, but I think WIPS makes sense because it focuses on wireless security.
upvoted 0 times
...
Dorathy
3 months ago
I agree with Lon, WIPS is designed to monitor the radio spectrum for unauthorized access points.
upvoted 0 times
...
Lon
3 months ago
I think the answer is D) WIPS.
upvoted 0 times
...
Alecia
3 months ago
D) WIPS sounds like the right tool for the job. It's all about monitoring the wireless spectrum for any unauthorized access points or attacks.
upvoted 0 times
Ronny
2 months ago
I agree, WIPS is designed to detect rogue access points and wireless attacks.
upvoted 0 times
...
Vanna
2 months ago
I think WIPS is the tool we need to monitor the radio spectrum for unauthorized access points.
upvoted 0 times
...
...

Save Cancel