New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GCCC Questions Bank

Page: 3 / 3
Total 93 questions

GIAC Critical Controls Certification (GCCC) Questions and Answers

Question 9

What is the relationship between a service and its associated port?

Options:

A.

A service closes a port after a period of inactivity

B.

A service relies on the port to select the protocol

C.

A service sets limits on the volume of traffic sent through the port

D.

A service opens the port and listens for network traffic

Question 10

According to attack lifecycle models, what is the attacker’s first step in compromising an organization?

Options:

A.

Privilege Escalation

B.

Exploitation

C.

Initial Compromise

D.

Reconnaissance

Question 11

A need has been identified to organize and control access to different classifications of information stored on a fileserver. Which of the following approaches will meet this need?

Options:

A.

Organize files according to the user that created them and allow the user to determine permissions

B.

Divide the documents into confidential, internal, and public folders, and ser permissions on each folder

C.

Set user roles by job or position, and create permission by role for each file

D.

Divide the documents by department and set permissions on each departmental folder

Question 12

To effectively implement the Data Protection CIS Control, which task needs to be implemented first?

Options:

A.

The organization’s proprietary data needs to be encrypted

B.

Employees need to be notified that proprietary data should be protected

C.

The organization’s proprietary data needs to be identified

D.

Appropriate file content matching needs to be configured

Page: 3 / 3
Total 93 questions