Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Cyber Security GCCC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCCC Premium Access

View all detail and faqs for the GCCC exam


460 Students Passed

86% Average Score

91% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following archiving methods would maximize log integrity?

Options:

A.

DVD-R

B.

USB flash drive

C.

Magnetic Tape

D.

CD-RW

Questions # 2:

An organization wants to test its procedure for data recovery. Which of the following will be most effective?

Options:

A.

Verifying a file can be recovered from backup media

B.

Verifying that backup process is running when it should

C.

Verifying that network backups can’t be read in transit

D.

Verifying there are no errors in the backup server logs

Questions # 3:

An organization has implemented a control for penetration testing and red team exercises conducted on their network. They have compiled metrics showing the success of the penetration testing (Penetration Tests), as well as the number of actual adversary attacks they have sustained (External Attacks). Assess the metrics below and determine the appropriate interpretation with respect to this control.

Question # 3

Options:

A.

The blue team is adequately protecting the network

B.

There are too many internal penetration tests being conducted

C.

The methods the red team is using are not effectively testing the network

D.

The red team is improving their capability to measure network security

Questions # 4:

An organization has implemented a policy to continually detect and remove malware from its network. Which of the following is a detective control needed for this?

Options:

A.

Host-based firewall sends alerts when packets are sent to a closed port

B.

Network Intrusion Prevention sends alerts when RST packets are received

C.

Network Intrusion Detection devices sends alerts when signatures are updated

D.

Host-based anti-virus sends alerts to a central security console

Questions # 5:

When evaluating the Wireless Access Control CIS Control, which of the following systems needs to be tested?

Options:

A.

Log management system

B.

802.1x authentication systems

C.

Data classification and access baselines

D.

PII data scanner

Questions # 6:

Dragonfly Industries requires firewall rules to go through a change management system before they are configured. Review the change management log. Which of the following lines in your firewall ruleset has expired and should be removed from the configuration?

Question # 6

Options:

A.

access-list outbound permit tcp host 10.1.1.7 any eq smtp

B.

access-list outbound deny tcp any host 74.125.228.2 eq www

C.

access-list inbound permit tcp 8.8.0.0 0.0.0.255 10.10.12.252 eq 8080

D.

access-list inbound permit tcp host 8.8.207.97 host 10.10.12.100 eq ssh

Questions # 7:

An Internet retailer's database was recently exploited by a foreign criminal organization via a remote attack. The initial exploit resulted in immediate root-level access. What could have been done to prevent this level of access being given to the intruder upon successful exploitation?

Options:

A.

Configure the DMZ firewall to block unnecessary service

B.

Install host integrity monitoring software

C.

Install updated anti-virus software

D.

Configure the database to run with lower privileges

Questions # 8:

What is the first step suggested before implementing any single CIS Control?

Options:

A.

Develop an effectiveness test

B.

Perform a gap analysis

C.

Perform a vulnerability scan

D.

Develop a roll-out schedule

Questions # 9:

What is the business goal of the Inventory and Control of Software Assets Control?

Options:

A.

Only authorized software should be installed on the agency ’s c omput er s ys t ems

B.

All software conforms to licensing requirements for the business

C.

Accurate software versions are captured to enable patching

D.

Accurate software versions and counts are documented for licensing updates

Questions # 10:

Which of the following statements is appropriate in an incident response report?

Options:

A.

There had been a storm on September 27th that may have caused a power surge

B.

The registry entry was modified on September 29th at 22:37

C.

The attacker may have been able to access the systems due to missing KB2965111

D.

The backup process may have failed at 2345 due to lack of available bandwidth

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.