Pass the GIAC Cyber Security GCCC Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following items would be used reactively for incident response?

Options:

A.

A schedule for creating and storing backup


B.

A phone tree used to contact necessary personnel


C.

A script used to verify patches are installed on systems


D.

An IPS rule that prevents web access from international locations


Questions # 2:

An organization is implementing a control for the Limitation and Control of Network Ports, Protocols, and Services CIS Control. Which action should they take when they discover that an application running on a web server is no longer needed?

Options:

A.

Uninstall the application providing the service


B.

Turn the service off in the host configuration files


C.

Block the protocol for the unneeded service at the firewall


D.

Create an access list on the router to filter traffic to the host


Questions # 3:

An organization has implemented a policy to detect and remove malicious software from its network. Which of the following actions is focused on correcting rather than preventing attack?

Options:

A.

Configuring a firewall to only allow communication to whitelisted hosts and ports


B.

Using Network access control to disable communication by hosts with viruses


C.

Disabling autorun features on all workstations on the network


D.

Training users to recognize potential phishing attempts


Questions # 4:

According to attack lifecycle models, what is the attacker’s first step in compromising an organization?

Options:

A.

Privilege Escalation


B.

Exploitation


C.

Initial Compromise


D.

Reconnaissance


Questions # 5:

Kenya is a system administrator for SANS. Per the recommendations of the CIS Controls she has a dedicated host (kenya- adminbox / 10.10.10.10) for any administrative tasks. She logs into the dedicated host with her domain admin credentials. Which of the following connections should not exist from kenya-adminbox?

Question # 5

Options:

A.

10.10.245.3389


B.

Mail.jane.org.25


C.

Firewall_charon.jane.org.22


D.

10.10.10.33.443


Questions # 6:

As part of a scheduled network discovery scan, what function should the automated scanning tool perform?

Options:

A.

Uninstall listening services that have not been used since the last scheduled scan


B.

Compare discovered ports and services to a known baseline to report deviations


C.

Alert the incident response team on ports and services added since the last scan


D.

Automatically close ports and services not included in the current baseline


Questions # 7:

John a network administrator at Northeast High School. Faculty have been complaining that although they can detect and authenticate to the faculty wireless network, they are unable to connect. While troubleshooting, John discovers that the wireless network server is out of DHCP addresses due to a large number of unauthorized student devices connecting to the network. Which course of action would be an effective temporary stopgap to secure the network until a permanent solution can be found?

Options:

A.

Limit access to allowed MAC addresses


B.

Increase the size of the DHCP pool


C.

Change the password immediately


D.

Shorten the DHCP lease time


Questions # 8:

What is the relationship between a service and its associated port?

Options:

A.

A service closes a port after a period of inactivity


B.

A service relies on the port to select the protocol


C.

A service sets limits on the volume of traffic sent through the port


D.

A service opens the port and listens for network traffic


Questions # 9:

If an attacker wanted to dump hashes or run wmic commands on a target machine, which of the following tools would he use?

Options:

A.

Mimikatz


B.

OpenVAS


C.

Metasploit


Questions # 10:

Which of the following actions will assist an organization specifically with implementing web application software security?

Options:

A.

Making sure that all hosts are patched during regularly scheduled maintenance


B.

Providing end-user security training to both internal staff and vendors


C.

Establishing network activity baselines among public-facing servers


D.

Having a plan to scan vulnerabilities of an application prior to deployment


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions