GIAC Certified Firewall Analyst GCFW Question # 24 Topic 3 Discussion

GIAC Certified Firewall Analyst GCFW Question # 24 Topic 3 Discussion

GCFW Exam Topic 3 Question 24 Discussion:
Question #: 24
Topic #: 3

John works as a Security Manager for Gentech Inc. The company has a Windows-based network.

John has been assigned a project to detect the services used by an attack to access the network.

For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network. Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?


A.

Custom service objects


B.

Signature attack objects


C.

Protocol anomaly attack objects


D.

Compound attack objects


Get Premium GCFW Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.