Certbus > GIAC > Cyber Security > GCCC > GCCC Online Practice Questions and Answers

GCCC Online Practice Questions and Answers

Questions 4

Which approach is recommended by the CIS Controls for performing penetration tests?

A. Document a single vulnerability per system

B. Utilize a single attack vector at a time

C. Complete intrusive tests on test systems

D. Execute all tests during network maintenance windows

Browse 93 Q&As
Questions 5

An organization has installed a firewall for Boundary Defense. It allows only outbound traffic from internal workstations for web and SSH, allows connections from the internet to the DMZ, and allows guest wireless access to the internet only. How can an auditor validate these rules?

A. Check for packets going from the Internet to the Web server

B. Try to send email from a wireless guest account

C. Check for packages going from the web server to the user workstations

D. Try to access the internal network from the wireless router

Browse 93 Q&As
Questions 6

When evaluating the Wireless Access Control CIS Control, which of the following systems needs to be tested?

A. Log management system

B. 802.1x authentication systems

C. Data classification and access baselines

D. PII data scanner

Browse 93 Q&As
Questions 7

What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?

A. Package diagram

B. Deployment diagram

C. Class diagram

D. Use case diagram

Browse 93 Q&As
Questions 8

Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?

A. Controlled Access Based on the Need to Know

B. Limitation and Control of Network Ports, Protocols and Services

C. Email and Web Browser Protections

D. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.

Browse 93 Q&As
Questions 9

Review the below results of an audit on a server. Based on these results, which document would you recommend be reviewed for training or updates?

A. Procedure for authorizing remote server access

B. Procedure for modifying file permissions

C. Procedure for adjusting network share permissions

D. Procedure for setting and resetting user passwords

Browse 93 Q&As
Questions 10

Which of the following should be used to test antivirus software?

A. FIPS 140-2

B. Code Red

C. Heartbleed

D. EICAR

Browse 93 Q&As
Questions 11

An organization has implemented a control for Controlled Use of Administrative Privileges. They are collecting audit data for each login, logout, and location for the root account of their MySQL server, but they are unable to attribute each of these logins to a specific user. What action can they take to rectify this?

A. Force the root account to only be accessible from the system console.

B. Turn on SELinux and user process accounting for the MySQL server.

C. Force user accounts to use `sudo' f or privileged use.

D. Blacklist client applications from being run in privileged mode.

Browse 93 Q&As
Exam Code: GCCC
Exam Name: GCCC - GIAC Critical Controls Certification (GCCC)
Last Update: May 09, 2024
Questions: 93 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99