Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCCC Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?

Options:
A.

Multi-Factor Authentication Standard

B.

Network Traffic/Service Baseline

C.

Network Device Configuration Baselines

D.

Network Information Flow

GIAC GCCC Premium Access
Questions 12

An auditor is focusing on potential vulnerabilities. Which of the following should cause an alert?

Options:
A.

Workstation on which a domain admin has never logged in

B.

Windows host with an uptime of 382 days

C.

Server that has zero browser plug-ins

D.

Fully patched guest machine that is not in the asset inventory

Questions 13

Which projects enumerates or maps security issues to CVE?

Options:
A.

SCAP

B.

CIS Controls

C.

NIST

D.

ISO 2700

Questions 14

What is the business goal of the Inventory and Control of Software Assets Control?

Options:
A.

Only authorized software should be installed on the agency ’s c omput er s ys t ems

B.

All software conforms to licensing requirements for the business

C.

Accurate software versions are captured to enable patching

D.

Accurate software versions and counts are documented for licensing updates

Questions 15

An organization has implemented a control for Controlled Use of Administrative Privilege. The control requires users to enter a password from their own user account before being allowed elevated privileges, and that no client applications (e.g. web browsers, e-mail clients) can be run with elevated privileges. Which of the following actions will validate this control is implemented properly?

Options:
A.

Check the log entries to match privilege use with access from authorized users.

B.

Run a script at intervals to identify processes running with administrative privilege.

C.

Force the root account to only be accessible from the system console.

Questions 16

What tool creates visual network topology output and results that can be analyzed by Ndiff to determine if a service or network asset has changed?

Options:
A.

Ngrep

B.

CIS-CAT

C.

Netscreen

D.

Zenmap

Questions 17

Of the options shown below, what is the first step in protecting network devices?

Options:
A.

Creating standard secure configurations for all devices

B.

Scanning the devices for known vulnerabilities

C.

Implementing IDS to detect attacks

D.

Applying all known security patches

Questions 18

An organization has implemented a policy to detect and remove malicious software from its network. Which of the following actions is focused on correcting rather than preventing attack?

Options:
A.

Configuring a firewall to only allow communication to whitelisted hosts and ports

B.

Using Network access control to disable communication by hosts with viruses

C.

Disabling autorun features on all workstations on the network

D.

Training users to recognize potential phishing attempts

Questions 19

Which of the following is necessary for implementing and automating the Continuous Vulnerability Assessment and Remediation CIS Control?

Options:
A.

Software Whitelisting System

B.

System Configuration Enforcement System

C.

Patch Management System

D.

Penetration Testing System

Questions 20

During a security audit which test should result in a source packet failing to reach its intended destination?

Options:
A.

A new connection request from the Internet is sent to a host on the company ’s internal net work

B.

A packet originating from the company’s DMZ is sent to a host on the company’s internal network

C.

A new connection request from the internet is sent to the company’s DNS server

D.

A packet originating from the company’s internal network is sent to the company’s DNS server